<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>AlmaLinux OS Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2022-04-13T14:28:12</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:org.almalinux.alba:def:20191992" version="635">
      <metadata>
        <title>ALBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:1992" ref_url="https://errata.almalinux.org/8/ALBA-2019-1992.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:1992" ref_url="https://access.redhat.com/errata/RHBA-2019:1992" source="RHSA"/>
        <reference ref_id="CVE-2019-0816" ref_url="https://access.redhat.com/security/cve/CVE-2019-0816" source="CVE"/>
        <description>The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.

Users of cloud-init are advised to upgrade to these updated packages.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-30"/>
          <updated date="2019-07-30"/>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-0816" impact="moderate" public="20190305">CVE-2019-0816</cve>
          <bugzilla href="https://bugzilla.redhat.com/1680165" id="1680165">CVE-2019-0816 cloud-init: extra ssh keys added to authorized_keys on the Azure platform</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="cloud-init is earlier than 0:18.5-1.el8.4" test_ref="oval:org.almalinux.alba:tst:20191992001"/>
          <criterion comment="cloud-init is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20191992002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20193384" version="638">
      <metadata>
        <title>ALBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:3384" ref_url="https://errata.almalinux.org/8/ALBA-2019-3384.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:3384" ref_url="https://access.redhat.com/errata/RHBA-2019:3384" source="RHSA"/>
        <reference ref_id="CVE-2019-8320" ref_url="https://access.redhat.com/security/cve/CVE-2019-8320" source="CVE"/>
        <reference ref_id="CVE-2019-8321" ref_url="https://access.redhat.com/security/cve/CVE-2019-8321" source="CVE"/>
        <reference ref_id="CVE-2019-8322" ref_url="https://access.redhat.com/security/cve/CVE-2019-8322" source="CVE"/>
        <reference ref_id="CVE-2019-8323" ref_url="https://access.redhat.com/security/cve/CVE-2019-8323" source="CVE"/>
        <reference ref_id="CVE-2019-8325" ref_url="https://access.redhat.com/security/cve/CVE-2019-8325" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-8320" impact="moderate" public="20190305">CVE-2019-8320</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-88" href="https://access.redhat.com/security/cve/CVE-2019-8321" impact="low" public="20190305">CVE-2019-8321</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-88" href="https://access.redhat.com/security/cve/CVE-2019-8322" impact="low" public="20190305">CVE-2019-8322</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-88" href="https://access.redhat.com/security/cve/CVE-2019-8323" impact="low" public="20190305">CVE-2019-8323</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-88" href="https://access.redhat.com/security/cve/CVE-2019-8325" impact="low" public="20190305">CVE-2019-8325</cve>
          <bugzilla href="https://bugzilla.redhat.com/1692512" id="1692512">CVE-2019-8320 rubygems: Delete directory using symlink when decompressing tar</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692514" id="1692514">CVE-2019-8321 rubygems: Escape sequence injection vulnerability in verbose</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692516" id="1692516">CVE-2019-8322 rubygems: Escape sequence injection vulnerability in gem owner</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692519" id="1692519">CVE-2019-8323 rubygems: Escape sequence injection vulnerability in API response handling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692522" id="1692522">CVE-2019-8325 rubygems: Escape sequence injection vulnerability in errors</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module ruby:2.5 is enabled" test_ref="oval:org.almalinux.alba:tst:20193384065"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ruby is earlier than 0:2.5.5-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840011"/>
              <criterion comment="ruby is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-devel is earlier than 0:2.5.5-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840031"/>
              <criterion comment="ruby-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-doc is earlier than 0:2.5.5-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840051"/>
              <criterion comment="ruby-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-irb is earlier than 0:2.5.5-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840071"/>
              <criterion comment="ruby-irb is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-libs is earlier than 0:2.5.5-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840091"/>
              <criterion comment="ruby-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt is earlier than 0:0.3.0-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840111"/>
              <criterion comment="rubygem-abrt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384012"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt is earlier than 0:0.3.0-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840112"/>
              <criterion comment="rubygem-abrt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384012"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt-doc is earlier than 0:0.3.0-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840131"/>
              <criterion comment="rubygem-abrt-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt-doc is earlier than 0:0.3.0-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840132"/>
              <criterion comment="rubygem-abrt-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bigdecimal is earlier than 0:1.3.4-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840151"/>
              <criterion comment="rubygem-bigdecimal is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson is earlier than 0:4.3.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840171"/>
              <criterion comment="rubygem-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson is earlier than 0:4.3.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840172"/>
              <criterion comment="rubygem-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson-doc is earlier than 0:4.3.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840191"/>
              <criterion comment="rubygem-bson-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384020"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson-doc is earlier than 0:4.3.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840192"/>
              <criterion comment="rubygem-bson-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384020"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.3.0+2024+c6f6daa5" test_ref="oval:org.almalinux.alba:tst:201933840211"/>
              <criterion comment="rubygem-bundler is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.4.0+2297+c6f6daa5" test_ref="oval:org.almalinux.alba:tst:201933840212"/>
              <criterion comment="rubygem-bundler is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384022"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.3.0+571+bab7c6bc" test_ref="oval:org.almalinux.alba:tst:201933840213"/>
              <criterion comment="rubygem-bundler is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840222"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.3.0+2024+c6f6daa5" test_ref="oval:org.almalinux.alba:tst:201933840231"/>
              <criterion comment="rubygem-bundler-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384024"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.4.0+2297+c6f6daa5" test_ref="oval:org.almalinux.alba:tst:201933840232"/>
              <criterion comment="rubygem-bundler-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384024"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.3.0+571+bab7c6bc" test_ref="oval:org.almalinux.alba:tst:201933840233"/>
              <criterion comment="rubygem-bundler-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840242"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-did_you_mean is earlier than 0:1.2.0-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840251"/>
              <criterion comment="rubygem-did_you_mean is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840262"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-io-console is earlier than 0:0.4.6-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840271"/>
              <criterion comment="rubygem-io-console is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-json is earlier than 0:2.1.0-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840291"/>
              <criterion comment="rubygem-json is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-minitest is earlier than 0:5.10.3-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840311"/>
              <criterion comment="rubygem-minitest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840322"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo is earlier than 0:2.5.1-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840331"/>
              <criterion comment="rubygem-mongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo is earlier than 0:2.5.1-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840332"/>
              <criterion comment="rubygem-mongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo-doc is earlier than 0:2.5.1-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840351"/>
              <criterion comment="rubygem-mongo-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384036"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo-doc is earlier than 0:2.5.1-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840352"/>
              <criterion comment="rubygem-mongo-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384036"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2 is earlier than 0:0.4.10-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840371"/>
              <criterion comment="rubygem-mysql2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2 is earlier than 0:0.4.10-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840372"/>
              <criterion comment="rubygem-mysql2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2-doc is earlier than 0:0.4.10-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840391"/>
              <criterion comment="rubygem-mysql2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2-doc is earlier than 0:0.4.10-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840392"/>
              <criterion comment="rubygem-mysql2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-net-telnet is earlier than 0:0.1.1-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840411"/>
              <criterion comment="rubygem-net-telnet is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840422"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-openssl is earlier than 0:2.1.2-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840431"/>
              <criterion comment="rubygem-openssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840442"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg is earlier than 0:1.0.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840451"/>
              <criterion comment="rubygem-pg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg is earlier than 0:1.0.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840452"/>
              <criterion comment="rubygem-pg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg-doc is earlier than 0:1.0.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alba:tst:201933840471"/>
              <criterion comment="rubygem-pg-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384048"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg-doc is earlier than 0:1.0.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alba:tst:201933840472"/>
              <criterion comment="rubygem-pg-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384048"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-power_assert is earlier than 0:1.1.1-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840491"/>
              <criterion comment="rubygem-power_assert is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840502"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-psych is earlier than 0:3.0.2-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840511"/>
              <criterion comment="rubygem-psych is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-rake is earlier than 0:12.3.0-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840531"/>
              <criterion comment="rubygem-rake is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840542"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-rdoc is earlier than 0:6.0.1-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840551"/>
              <criterion comment="rubygem-rdoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840562"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-test-unit is earlier than 0:3.2.7-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840571"/>
              <criterion comment="rubygem-test-unit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840582"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-xmlrpc is earlier than 0:0.3.0-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840591"/>
              <criterion comment="rubygem-xmlrpc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840602"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygems is earlier than 0:2.7.6.2-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840611"/>
              <criterion comment="rubygems is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygems-devel is earlier than 0:2.7.6.2-105.module_el8.1.0+214+9be47fd7" test_ref="oval:org.almalinux.alba:tst:201933840631"/>
              <criterion comment="rubygems-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840642"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20193408" version="635">
      <metadata>
        <title>ALBA-2019:3408: openjpeg2 bug fix and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:3408" ref_url="https://errata.almalinux.org/8/ALBA-2019-3408.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:3408" ref_url="https://access.redhat.com/errata/RHBA-2019:3408" source="RHSA"/>
        <reference ref_id="CVE-2018-6616" ref_url="https://access.redhat.com/security/cve/CVE-2018-6616" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-6616" impact="low" public="20180204">CVE-2018-6616</cve>
          <bugzilla href="https://bugzilla.redhat.com/1542321" id="1542321">CVE-2018-6616 openjpeg2: Excessive iteration in openjp2/t1.c:opj_t1_encode_cblks can allow for denial of service via crafted BMP file</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openjpeg2 is earlier than 0:2.3.1-1.el8" test_ref="oval:org.almalinux.alba:tst:20193408001"/>
              <criterion comment="openjpeg2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel is earlier than 0:2.3.1-1.el8" test_ref="oval:org.almalinux.alba:tst:20193408003"/>
              <criterion comment="openjpeg2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel-docs is earlier than 0:2.3.1-1.el8" test_ref="oval:org.almalinux.alba:tst:20193408005"/>
              <criterion comment="openjpeg2-devel-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-tools is earlier than 0:2.3.1-1.el8" test_ref="oval:org.almalinux.alba:tst:20193408007"/>
              <criterion comment="openjpeg2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20193416" version="637">
      <metadata>
        <title>ALBA-2019:3416: pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:3416" ref_url="https://errata.almalinux.org/8/ALBA-2019-3416.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:3416" ref_url="https://access.redhat.com/errata/RHBA-2019:3416" source="RHSA"/>
        <reference ref_id="CVE-2019-12086" ref_url="https://access.redhat.com/security/cve/CVE-2019-12086" source="CVE"/>
        <reference ref_id="CVE-2019-12814" ref_url="https://access.redhat.com/security/cve/CVE-2019-12814" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-12086" impact="moderate" public="20190514">CVE-2019-12086</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-12814" impact="moderate" public="20190604">CVE-2019-12814</cve>
          <bugzilla href="https://bugzilla.redhat.com/1713468" id="1713468">CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1725795" id="1725795">CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module pki-deps:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416067"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160011"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160012"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160031"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160032"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160051"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160052"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160071"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160072"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160091"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160092"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160111"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160112"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160131"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160132"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160151"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160152"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-annotations is earlier than 0:2.9.9-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alba:tst:201934160171"/>
                  <criterion comment="jackson-annotations is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160182"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-core is earlier than 0:2.9.9-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alba:tst:201934160191"/>
                  <criterion comment="jackson-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160202"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-databind is earlier than 0:2.9.9.2-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alba:tst:201934160211"/>
                  <criterion comment="jackson-databind is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160231"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160232"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160251"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160252"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160271"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160272"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160291"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160292"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160311"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160312"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160331"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160332"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.7-16.module_el8.2.0+315+896aef55" test_ref="oval:org.almalinux.alba:tst:201934160351"/>
                  <criterion comment="pki-servlet-4.0-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160362"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-engine is earlier than 1:9.0.7-16.module_el8.2.0+315+896aef55" test_ref="oval:org.almalinux.alba:tst:201934160371"/>
                  <criterion comment="pki-servlet-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160391"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160392"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160411"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160412"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160431"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160432"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alba:tst:201934160451"/>
                  <criterion comment="resteasy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416046"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+454+67dccca4" test_ref="oval:org.almalinux.alba:tst:201934160452"/>
                  <criterion comment="resteasy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160462"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160471"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160472"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160491"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160492"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160511"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160512"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160531"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160532"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160551"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160552"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160571"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160572"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160591"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160592"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160611"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160612"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160631"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160632"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160651"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160652"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module pki-core:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416094"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="jss is earlier than 0:4.6.0-5.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160681"/>
                  <criterion comment="jss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160692"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jss-javadoc is earlier than 0:4.6.0-5.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160701"/>
                  <criterion comment="jss-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160712"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk is earlier than 0:4.21.0-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160721"/>
                  <criterion comment="ldapjdk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160732"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk-javadoc is earlier than 0:4.21.0-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160741"/>
                  <criterion comment="ldapjdk-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160752"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160761"/>
                  <criterion comment="pki-base is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160772"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base-java is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160781"/>
                  <criterion comment="pki-base-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160792"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-ca is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160801"/>
                  <criterion comment="pki-ca is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160812"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-kra is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160821"/>
                  <criterion comment="pki-kra is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160832"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-server is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160841"/>
                  <criterion comment="pki-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160852"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-symkey is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160861"/>
                  <criterion comment="pki-symkey is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160872"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-tools is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160881"/>
                  <criterion comment="pki-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160892"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pki is earlier than 0:10.7.3-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160901"/>
                  <criterion comment="python3-pki is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160912"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="tomcatjss is earlier than 0:7.4.1-1.module_el8.1.0+238+005506d1" test_ref="oval:org.almalinux.alba:tst:201934160921"/>
                  <criterion comment="tomcatjss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160932"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20193621" version="635">
      <metadata>
        <title>ALBA-2019:3621: libidn2 bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:3621" ref_url="https://errata.almalinux.org/8/ALBA-2019-3621.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:3621" ref_url="https://access.redhat.com/errata/RHBA-2019:3621" source="RHSA"/>
        <reference ref_id="CVE-2019-18224" ref_url="https://access.redhat.com/security/cve/CVE-2019-18224" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-18224" impact="moderate" public="20190107">CVE-2019-18224</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764780" id="1764780">CVE-2019-18224 libidn2: heap-based buffer overflow in idn2_to_ascii_4i in lib/lookup.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="idn2 is earlier than 0:2.2.0-1.el8" test_ref="oval:org.almalinux.alba:tst:20193621001"/>
              <criterion comment="idn2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193621002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libidn2 is earlier than 0:2.2.0-1.el8" test_ref="oval:org.almalinux.alba:tst:20193621003"/>
              <criterion comment="libidn2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193621004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libidn2-devel is earlier than 0:2.2.0-1.el8" test_ref="oval:org.almalinux.alba:tst:20193621005"/>
              <criterion comment="libidn2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193621006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20193674" version="635">
      <metadata>
        <title>ALBA-2019:3674: openldap bug fix and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:3674" ref_url="https://errata.almalinux.org/8/ALBA-2019-3674.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:3674" ref_url="https://access.redhat.com/errata/RHBA-2019:3674" source="RHSA"/>
        <reference ref_id="CVE-2020-15719" ref_url="https://access.redhat.com/security/cve/CVE-2020-15719" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-297" href="https://access.redhat.com/security/cve/CVE-2020-15719" impact="low" public="20190819">CVE-2020-15719</cve>
          <bugzilla href="https://bugzilla.redhat.com/1853350" id="1853350">CVE-2020-15719 openldap: Certificate validation incorrectly matches name against CN-ID</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openldap is earlier than 0:2.4.46-10.el8" test_ref="oval:org.almalinux.alba:tst:20193674001"/>
              <criterion comment="openldap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193674002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openldap-clients is earlier than 0:2.4.46-10.el8" test_ref="oval:org.almalinux.alba:tst:20193674003"/>
              <criterion comment="openldap-clients is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193674004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openldap-devel is earlier than 0:2.4.46-10.el8" test_ref="oval:org.almalinux.alba:tst:20193674005"/>
              <criterion comment="openldap-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193674006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20194268" version="635">
      <metadata>
        <title>ALBA-2019:4268: idm:DL1 bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2019:4268" ref_url="https://errata.almalinux.org/8/ALBA-2019-4268.html" source="ALSA"/>
        <reference ref_id="RHBA-2019:4268" ref_url="https://access.redhat.com/errata/RHBA-2019:4268" source="RHSA"/>
        <reference ref_id="CVE-2019-10195" ref_url="https://access.redhat.com/security/cve/CVE-2019-10195" source="CVE"/>
        <reference ref_id="CVE-2019-14867" ref_url="https://access.redhat.com/security/cve/CVE-2019-14867" source="CVE"/>
        <description>Bug Fix(es):

* IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-17"/>
          <updated date="2019-12-17"/>
          <cve cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-532-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10195" impact="moderate" public="20191126">CVE-2019-10195</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="(CWE-94|CWE-400)" href="https://access.redhat.com/security/cve/CVE-2019-14867" impact="important" public="20190826">CVE-2019-14867</cve>
          <bugzilla href="https://bugzilla.redhat.com/1726223" id="1726223">CVE-2019-10195 ipa: Batch API logging user passwords to /var/log/httpd/error_log</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1766920" id="1766920">CVE-2019-14867 ipa: Denial of service in IPA server due to wrong use of ber_scanf()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module idm:DL1 is enabled" test_ref="oval:org.almalinux.alba:tst:20194268055"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind-dyndb-ldap is earlier than 0:11.1-14.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680011"/>
              <criterion comment="bind-dyndb-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="custodia is earlier than 0:0.6.0-3.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680031"/>
              <criterion comment="custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268004"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="custodia is earlier than 0:0.6.0-3.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680032"/>
              <criterion comment="custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-client is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680051"/>
              <criterion comment="ipa-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-client-common is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680071"/>
              <criterion comment="ipa-client-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-client-samba is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680091"/>
              <criterion comment="ipa-client-samba is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-common is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680111"/>
              <criterion comment="ipa-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680122"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-healthcheck is earlier than 0:0.3-4.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680131"/>
              <criterion comment="ipa-healthcheck is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-idoverride-memberof-plugin is earlier than 0:0.0.4-6.module_el8.2.0+374+0d2d74a1" test_ref="oval:org.almalinux.alba:tst:201942680151"/>
              <criterion comment="ipa-idoverride-memberof-plugin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-python-compat is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680171"/>
              <criterion comment="ipa-python-compat is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-server is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680191"/>
              <criterion comment="ipa-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-server-common is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680211"/>
              <criterion comment="ipa-server-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-server-dns is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680231"/>
              <criterion comment="ipa-server-dns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680242"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipa-server-trust-ad is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680251"/>
              <criterion comment="ipa-server-trust-ad is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opendnssec is earlier than 0:1.4.14-1.module_el8.2.0+374+0d2d74a1" test_ref="oval:org.almalinux.alba:tst:201942680271"/>
              <criterion comment="opendnssec is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-custodia is earlier than 0:0.6.0-3.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680291"/>
              <criterion comment="python3-custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268030"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-custodia is earlier than 0:0.6.0-3.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680292"/>
              <criterion comment="python3-custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268030"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-ipaclient is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680311"/>
              <criterion comment="python3-ipaclient is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680322"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-ipalib is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680331"/>
              <criterion comment="python3-ipalib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680342"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-ipaserver is earlier than 0:4.8.0-13.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680351"/>
              <criterion comment="python3-ipaserver is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680362"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680371"/>
              <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680372"/>
              <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-kdcproxy is earlier than 0:0.4-3.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680391"/>
              <criterion comment="python3-kdcproxy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680411"/>
              <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680412"/>
              <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680431"/>
              <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680432"/>
              <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680451"/>
              <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680452"/>
              <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680471"/>
              <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680472"/>
              <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slapi-nis is earlier than 0:0.56.3-2.module_el8.2.0+374+0d2d74a1" test_ref="oval:org.almalinux.alba:tst:201942680491"/>
              <criterion comment="slapi-nis is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680502"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="softhsm is earlier than 0:2.4.0-2.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680511"/>
              <criterion comment="softhsm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="softhsm-devel is earlier than 0:2.4.0-2.module_el8.1.0+265+e1e65be4" test_ref="oval:org.almalinux.alba:tst:201942680531"/>
              <criterion comment="softhsm-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680542"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20201376" version="636">
      <metadata>
        <title>ALBA-2020:1376: net-snmp bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2020:1376" ref_url="https://errata.almalinux.org/8/ALBA-2020-1376.html" source="ALSA"/>
        <reference ref_id="RHBA-2020:1376" ref_url="https://access.redhat.com/errata/RHBA-2020:1376" source="RHSA"/>
        <reference ref_id="CVE-2019-20892" ref_url="https://access.redhat.com/security/cve/CVE-2019-20892" source="CVE"/>
        <description>The net-snmp packages provide various libraries and tools for the Simple
Network Management Protocol (SNMP), including an SNMP library, an
extensible agent, tools for requesting or setting information from SNMP
agents, tools for generating and handling SNMP traps, a version of the
netstat command which uses SNMP, and a Tk/Perl Management Information Base
(MIB) browser.

Bug Fix(es) and Enhancement(s):

* net-snmpd double free or corruption error (BZ#1802055)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-20892" impact="moderate" public="20200102">CVE-2019-20892</cve>
          <bugzilla href="https://bugzilla.redhat.com/1851145" id="1851145">CVE-2019-20892 net-snmp: double free in usm_free_usmStateReference function in snmplib/snmpusm.c via an SNMPv3 GetBulk request</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="net-snmp is earlier than 1:5.8-12.el8_1.1" test_ref="oval:org.almalinux.alba:tst:20201376001"/>
              <criterion comment="net-snmp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-agent-libs is earlier than 1:5.8-12.el8_1.1" test_ref="oval:org.almalinux.alba:tst:20201376003"/>
              <criterion comment="net-snmp-agent-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-devel is earlier than 1:5.8-12.el8_1.1" test_ref="oval:org.almalinux.alba:tst:20201376005"/>
              <criterion comment="net-snmp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-libs is earlier than 1:5.8-12.el8_1.1" test_ref="oval:org.almalinux.alba:tst:20201376007"/>
              <criterion comment="net-snmp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-utils is earlier than 1:5.8-12.el8_1.1" test_ref="oval:org.almalinux.alba:tst:20201376009"/>
              <criterion comment="net-snmp-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20201628" version="636">
      <metadata>
        <title>ALBA-2020:1628: pcp bug fix and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2020:1628" ref_url="https://errata.almalinux.org/8/ALBA-2020-1628.html" source="ALSA"/>
        <reference ref_id="RHBA-2020:1628" ref_url="https://access.redhat.com/errata/RHBA-2020:1628" source="RHSA"/>
        <reference ref_id="CVE-2019-3695" ref_url="https://access.redhat.com/security/cve/CVE-2019-3695" source="CVE"/>
        <reference ref_id="CVE-2019-3696" ref_url="https://access.redhat.com/security/cve/CVE-2019-3696" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-3695" impact="low" public="20191014">CVE-2019-3695</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-3696" impact="low" public="20191014">CVE-2019-3696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1811703" id="1811703">CVE-2019-3695 pcp: Local privilege escalation in pcp spec file %post section</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1811707" id="1811707">CVE-2019-3696 pcp: Local privilege escalation in pcp spec file through migrate_tempdirs</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628001"/>
              <criterion comment="pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-conf is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628003"/>
              <criterion comment="pcp-conf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-devel is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628005"/>
              <criterion comment="pcp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-doc is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628007"/>
              <criterion comment="pcp-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2elasticsearch is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628009"/>
              <criterion comment="pcp-export-pcp2elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2graphite is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628011"/>
              <criterion comment="pcp-export-pcp2graphite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2influxdb is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628013"/>
              <criterion comment="pcp-export-pcp2influxdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2json is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628015"/>
              <criterion comment="pcp-export-pcp2json is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2spark is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628017"/>
              <criterion comment="pcp-export-pcp2spark is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2xml is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628019"/>
              <criterion comment="pcp-export-pcp2xml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-pcp2zabbix is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628021"/>
              <criterion comment="pcp-export-pcp2zabbix is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-export-zabbix-agent is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628023"/>
              <criterion comment="pcp-export-zabbix-agent is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-gui is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628025"/>
              <criterion comment="pcp-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-import-collectl2pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628027"/>
              <criterion comment="pcp-import-collectl2pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-import-ganglia2pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628029"/>
              <criterion comment="pcp-import-ganglia2pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-import-iostat2pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628031"/>
              <criterion comment="pcp-import-iostat2pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-import-mrtg2pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628033"/>
              <criterion comment="pcp-import-mrtg2pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-import-sar2pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628035"/>
              <criterion comment="pcp-import-sar2pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-libs is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628037"/>
              <criterion comment="pcp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-libs-devel is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628039"/>
              <criterion comment="pcp-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-manager is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628041"/>
              <criterion comment="pcp-manager is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-activemq is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628043"/>
              <criterion comment="pcp-pmda-activemq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-apache is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628045"/>
              <criterion comment="pcp-pmda-apache is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-bash is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628047"/>
              <criterion comment="pcp-pmda-bash is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-bcc is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628049"/>
              <criterion comment="pcp-pmda-bcc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-bind2 is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628051"/>
              <criterion comment="pcp-pmda-bind2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-bonding is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628053"/>
              <criterion comment="pcp-pmda-bonding is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-bpftrace is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628055"/>
              <criterion comment="pcp-pmda-bpftrace is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-cifs is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628057"/>
              <criterion comment="pcp-pmda-cifs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-cisco is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628059"/>
              <criterion comment="pcp-pmda-cisco is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-dbping is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628061"/>
              <criterion comment="pcp-pmda-dbping is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-dm is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628063"/>
              <criterion comment="pcp-pmda-dm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-docker is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628065"/>
              <criterion comment="pcp-pmda-docker is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-ds389 is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628067"/>
              <criterion comment="pcp-pmda-ds389 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-ds389log is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628069"/>
              <criterion comment="pcp-pmda-ds389log is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-elasticsearch is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628071"/>
              <criterion comment="pcp-pmda-elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-gfs2 is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628073"/>
              <criterion comment="pcp-pmda-gfs2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-gluster is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628075"/>
              <criterion comment="pcp-pmda-gluster is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-gpfs is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628077"/>
              <criterion comment="pcp-pmda-gpfs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-gpsd is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628079"/>
              <criterion comment="pcp-pmda-gpsd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-haproxy is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628081"/>
              <criterion comment="pcp-pmda-haproxy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-infiniband is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628083"/>
              <criterion comment="pcp-pmda-infiniband is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-json is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628085"/>
              <criterion comment="pcp-pmda-json is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-libvirt is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628087"/>
              <criterion comment="pcp-pmda-libvirt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-lio is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628089"/>
              <criterion comment="pcp-pmda-lio is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-lmsensors is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628091"/>
              <criterion comment="pcp-pmda-lmsensors is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-logger is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628093"/>
              <criterion comment="pcp-pmda-logger is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-lustre is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628095"/>
              <criterion comment="pcp-pmda-lustre is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-lustrecomm is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628097"/>
              <criterion comment="pcp-pmda-lustrecomm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-mailq is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628099"/>
              <criterion comment="pcp-pmda-mailq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-memcache is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628101"/>
              <criterion comment="pcp-pmda-memcache is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-mic is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628103"/>
              <criterion comment="pcp-pmda-mic is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-mounts is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628105"/>
              <criterion comment="pcp-pmda-mounts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-mssql is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628107"/>
              <criterion comment="pcp-pmda-mssql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-mysql is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628109"/>
              <criterion comment="pcp-pmda-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-named is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628111"/>
              <criterion comment="pcp-pmda-named is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-netcheck is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628113"/>
              <criterion comment="pcp-pmda-netcheck is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-netfilter is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628115"/>
              <criterion comment="pcp-pmda-netfilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-news is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628117"/>
              <criterion comment="pcp-pmda-news is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-nfsclient is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628119"/>
              <criterion comment="pcp-pmda-nfsclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-nginx is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628121"/>
              <criterion comment="pcp-pmda-nginx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-nvidia-gpu is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628123"/>
              <criterion comment="pcp-pmda-nvidia-gpu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-openmetrics is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628125"/>
              <criterion comment="pcp-pmda-openmetrics is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-oracle is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628127"/>
              <criterion comment="pcp-pmda-oracle is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-pdns is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628129"/>
              <criterion comment="pcp-pmda-pdns is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-perfevent is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628131"/>
              <criterion comment="pcp-pmda-perfevent is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-podman is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628133"/>
              <criterion comment="pcp-pmda-podman is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-postfix is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628135"/>
              <criterion comment="pcp-pmda-postfix is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-postgresql is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628137"/>
              <criterion comment="pcp-pmda-postgresql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-redis is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628139"/>
              <criterion comment="pcp-pmda-redis is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-roomtemp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628141"/>
              <criterion comment="pcp-pmda-roomtemp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-rpm is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628143"/>
              <criterion comment="pcp-pmda-rpm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-rsyslog is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628145"/>
              <criterion comment="pcp-pmda-rsyslog is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-samba is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628147"/>
              <criterion comment="pcp-pmda-samba is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-sendmail is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628149"/>
              <criterion comment="pcp-pmda-sendmail is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-shping is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628151"/>
              <criterion comment="pcp-pmda-shping is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-slurm is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628153"/>
              <criterion comment="pcp-pmda-slurm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-smart is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628155"/>
              <criterion comment="pcp-pmda-smart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-snmp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628157"/>
              <criterion comment="pcp-pmda-snmp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-summary is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628159"/>
              <criterion comment="pcp-pmda-summary is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-systemd is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628161"/>
              <criterion comment="pcp-pmda-systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-trace is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628163"/>
              <criterion comment="pcp-pmda-trace is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-unbound is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628165"/>
              <criterion comment="pcp-pmda-unbound is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-vmware is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628167"/>
              <criterion comment="pcp-pmda-vmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-weblog is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628169"/>
              <criterion comment="pcp-pmda-weblog is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-zimbra is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628171"/>
              <criterion comment="pcp-pmda-zimbra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-pmda-zswap is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628173"/>
              <criterion comment="pcp-pmda-zswap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-selinux is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628175"/>
              <criterion comment="pcp-selinux is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-system-tools is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628177"/>
              <criterion comment="pcp-system-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-testsuite is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628179"/>
              <criterion comment="pcp-testsuite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcp-zeroconf is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628181"/>
              <criterion comment="pcp-zeroconf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-PCP-LogImport is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628183"/>
              <criterion comment="perl-PCP-LogImport is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-PCP-LogSummary is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628185"/>
              <criterion comment="perl-PCP-LogSummary is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-PCP-MMV is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628187"/>
              <criterion comment="perl-PCP-MMV is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-PCP-PMDA is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628189"/>
              <criterion comment="perl-PCP-PMDA is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pcp is earlier than 0:5.0.2-5.el8" test_ref="oval:org.almalinux.alba:tst:20201628191"/>
              <criterion comment="python3-pcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201628192"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20210621" version="635">
      <metadata>
        <title>ALBA-2021:0621: microcode_ctl bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2021:0621" ref_url="https://errata.almalinux.org/8/ALBA-2021-0621.html" source="ALSA"/>
        <reference ref_id="RHBA-2021:0621" ref_url="https://access.redhat.com/errata/RHBA-2021:0621" source="RHSA"/>
        <reference ref_id="CVE-2020-8696" ref_url="https://access.redhat.com/security/cve/CVE-2020-8696" source="CVE"/>
        <description>The microcode_ctl packages provide microcode updates for Intel and AMD
processors.

Bug Fix(es) and Enhancement(s):

* [rhel-8.3.0.z] [HPEMC 8.3.z REGRESSION] Regression in intel microcode as
of 20201110 (BZ#1907898)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-22"/>
          <updated date="2021-02-22"/>
          <cve cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-8696" impact="moderate" public="20201110:1355">CVE-2020-8696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1890355" id="1890355">CVE-2020-8696 hw: Vector Register Leakage-Active</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl is earlier than 4:20200609-2.20210216.1.el8_3" test_ref="oval:org.almalinux.alba:tst:20210621001"/>
          <criterion comment="microcode_ctl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20210621002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alba:def:20213054" version="635">
      <metadata>
        <title>ALBA-2021:3054: opencryptoki bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALBA-2021:3054" ref_url="https://errata.almalinux.org/8/ALBA-2021-3054.html" source="ALSA"/>
        <reference ref_id="RHBA-2021:3054" ref_url="https://access.redhat.com/errata/RHBA-2021:3054" source="RHSA"/>
        <reference ref_id="CVE-2021-3798" ref_url="https://access.redhat.com/security/cve/CVE-2021-3798" source="CVE"/>
        <description>The opencryptoki packages contain version 2.11 of the PKCS#11 API,
implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards.
These packages includes support for the IBM 4758 Cryptographic CoProcessor
(with the PKCS#11 firmware loaded), the IBM eServer Cryptographic
Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC
0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic
Function (FC 3863 on IBM System z). The opencryptoki packages also bring a
software token implementation that can be used without any cryptographic
hardware. These packages contain the Slot Daemon (pkcsslotd) and general
utilities.

Bug Fix(es) and Enhancement(s):

* RHEL8.5 - openCryptoki: Soft token does not check if an EC key is valid
(BZ#1979173)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-08-10"/>
          <updated date="2021-08-10"/>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2021-3798" impact="moderate" public="20210518">CVE-2021-3798</cve>
          <bugzilla href="https://bugzilla.redhat.com/1990591" id="1990591">CVE-2021-3798 openCryptoki: Soft token does not check if an EC key is valid</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="opencryptoki is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054001"/>
              <criterion comment="opencryptoki is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-ccatok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054003"/>
              <criterion comment="opencryptoki-ccatok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-devel is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054005"/>
              <criterion comment="opencryptoki-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-ep11tok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054007"/>
              <criterion comment="opencryptoki-ep11tok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-icatok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054009"/>
              <criterion comment="opencryptoki-icatok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-icsftok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054011"/>
              <criterion comment="opencryptoki-icsftok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-libs is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054013"/>
              <criterion comment="opencryptoki-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-swtok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054015"/>
              <criterion comment="opencryptoki-swtok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="opencryptoki-tpmtok is earlier than 0:3.15.1-6.el8_4" test_ref="oval:org.almalinux.alba:tst:20213054017"/>
              <criterion comment="opencryptoki-tpmtok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20213054018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20193845" version="640">
      <metadata>
        <title>ALEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2019:3845" ref_url="https://errata.almalinux.org/8/ALEA-2019-3845.html" source="ALSA"/>
        <reference ref_id="RHEA-2019:3845" ref_url="https://access.redhat.com/errata/RHEA-2019:3845" source="RHSA"/>
        <reference ref_id="CVE-2019-0117" ref_url="https://access.redhat.com/security/cve/CVE-2019-0117" source="CVE"/>
        <description>The microcode_ctl packages provide microcode updates for Intel x86 processors.

With this update, the Intel microcode version has been updated to microcode-20191112.

Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-12"/>
          <updated date="2019-11-12"/>
          <cve cvss3="6.0/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-1220-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-0117" impact="important" public="20191112:1800">CVE-2019-0117</cve>
          <bugzilla href="https://bugzilla.redhat.com/1758414" id="1758414">CVE-2019-0117 hw: Intel SGX information leak</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl is earlier than 4:20190618-1.20191112.1.el8_1" test_ref="oval:org.almalinux.alea:tst:20193845001"/>
          <criterion comment="microcode_ctl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20210621002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20194262" version="635">
      <metadata>
        <title>ALEA-2019:4262: webkit2gtk3 enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2019:4262" ref_url="https://errata.almalinux.org/8/ALEA-2019-4262.html" source="ALSA"/>
        <reference ref_id="RHEA-2019:4262" ref_url="https://access.redhat.com/errata/RHEA-2019:4262" source="RHSA"/>
        <reference ref_id="CVE-2019-8644" ref_url="https://access.redhat.com/security/cve/CVE-2019-8644" source="CVE"/>
        <reference ref_id="CVE-2019-8649" ref_url="https://access.redhat.com/security/cve/CVE-2019-8649" source="CVE"/>
        <reference ref_id="CVE-2019-8658" ref_url="https://access.redhat.com/security/cve/CVE-2019-8658" source="CVE"/>
        <reference ref_id="CVE-2019-8669" ref_url="https://access.redhat.com/security/cve/CVE-2019-8669" source="CVE"/>
        <reference ref_id="CVE-2019-8674" ref_url="https://access.redhat.com/security/cve/CVE-2019-8674" source="CVE"/>
        <reference ref_id="CVE-2019-8678" ref_url="https://access.redhat.com/security/cve/CVE-2019-8678" source="CVE"/>
        <reference ref_id="CVE-2019-8680" ref_url="https://access.redhat.com/security/cve/CVE-2019-8680" source="CVE"/>
        <reference ref_id="CVE-2019-8683" ref_url="https://access.redhat.com/security/cve/CVE-2019-8683" source="CVE"/>
        <reference ref_id="CVE-2019-8684" ref_url="https://access.redhat.com/security/cve/CVE-2019-8684" source="CVE"/>
        <reference ref_id="CVE-2019-8688" ref_url="https://access.redhat.com/security/cve/CVE-2019-8688" source="CVE"/>
        <reference ref_id="CVE-2019-8707" ref_url="https://access.redhat.com/security/cve/CVE-2019-8707" source="CVE"/>
        <reference ref_id="CVE-2019-8719" ref_url="https://access.redhat.com/security/cve/CVE-2019-8719" source="CVE"/>
        <reference ref_id="CVE-2019-8733" ref_url="https://access.redhat.com/security/cve/CVE-2019-8733" source="CVE"/>
        <reference ref_id="CVE-2019-8763" ref_url="https://access.redhat.com/security/cve/CVE-2019-8763" source="CVE"/>
        <reference ref_id="CVE-2019-8765" ref_url="https://access.redhat.com/security/cve/CVE-2019-8765" source="CVE"/>
        <reference ref_id="CVE-2019-8821" ref_url="https://access.redhat.com/security/cve/CVE-2019-8821" source="CVE"/>
        <reference ref_id="CVE-2019-8822" ref_url="https://access.redhat.com/security/cve/CVE-2019-8822" source="CVE"/>
        <description>This update adds the following enhancement:

* Update WebKitGTK to 2.24.4 (BZ#1755824).

Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-17"/>
          <updated date="2019-12-17"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8644" impact="moderate" public="20190829">CVE-2019-8644</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8649" impact="moderate" public="20190829">CVE-2019-8649</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8658" impact="moderate" public="20190829">CVE-2019-8658</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8669" impact="moderate" public="20190829">CVE-2019-8669</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8674" impact="moderate" public="20191029">CVE-2019-8674</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8678" impact="moderate" public="20190829">CVE-2019-8678</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8680" impact="moderate" public="20190829">CVE-2019-8680</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8683" impact="moderate" public="20190829">CVE-2019-8683</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8684" impact="moderate" public="20190829">CVE-2019-8684</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8688" impact="moderate" public="20190829">CVE-2019-8688</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8707" impact="moderate" public="20191029">CVE-2019-8707</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8719" impact="moderate" public="20191029">CVE-2019-8719</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8733" impact="moderate" public="20191029">CVE-2019-8733</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8763" impact="moderate" public="20191029">CVE-2019-8763</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8765" impact="moderate" public="20191108">CVE-2019-8765</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8821" impact="moderate" public="20191108">CVE-2019-8821</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8822" impact="moderate" public="20191108">CVE-2019-8822</cve>
          <bugzilla href="https://bugzilla.redhat.com/1876542" id="1876542">CVE-2019-8765 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876592" id="1876592">CVE-2019-8821 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876593" id="1876593">CVE-2019-8822 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876608" id="1876608">CVE-2019-8674 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876609" id="1876609">CVE-2019-8707 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876610" id="1876610">CVE-2019-8719 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876613" id="1876613">CVE-2019-8733 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876615" id="1876615">CVE-2019-8763 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876626" id="1876626">CVE-2019-8644 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876628" id="1876628">CVE-2019-8649 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876629" id="1876629">CVE-2019-8658 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876631" id="1876631">CVE-2019-8669 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876646" id="1876646">CVE-2019-8678 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876648" id="1876648">CVE-2019-8680 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876651" id="1876651">CVE-2019-8683 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876652" id="1876652">CVE-2019-8684 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876656" id="1876656">CVE-2019-8688 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="webkit2gtk3 is earlier than 0:2.24.4-2.el8_1" test_ref="oval:org.almalinux.alea:tst:20194262001"/>
              <criterion comment="webkit2gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-devel is earlier than 0:2.24.4-2.el8_1" test_ref="oval:org.almalinux.alea:tst:20194262003"/>
              <criterion comment="webkit2gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc is earlier than 0:2.24.4-2.el8_1" test_ref="oval:org.almalinux.alea:tst:20194262005"/>
              <criterion comment="webkit2gtk3-jsc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc-devel is earlier than 0:2.24.4-2.el8_1" test_ref="oval:org.almalinux.alea:tst:20194262007"/>
              <criterion comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-plugin-process-gtk2 is earlier than 0:2.24.4-2.el8_1" test_ref="oval:org.almalinux.alea:tst:20194262009"/>
              <criterion comment="webkit2gtk3-plugin-process-gtk2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20200330" version="634">
      <metadata>
        <title>ALEA-2020:0330: nodejs:12 enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2020:0330" ref_url="https://errata.almalinux.org/8/ALEA-2020-0330.html" source="ALSA"/>
        <reference ref_id="RHEA-2020:0330" ref_url="https://access.redhat.com/errata/RHEA-2020:0330" source="RHSA"/>
        <reference ref_id="CVE-2019-16775" ref_url="https://access.redhat.com/security/cve/CVE-2019-16775" source="CVE"/>
        <reference ref_id="CVE-2019-16776" ref_url="https://access.redhat.com/security/cve/CVE-2019-16776" source="CVE"/>
        <reference ref_id="CVE-2019-16777" ref_url="https://access.redhat.com/security/cve/CVE-2019-16777" source="CVE"/>
        <description>The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16775" impact="low" public="20191212">CVE-2019-16775</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16776" impact="low" public="20191212">CVE-2019-16776</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16777" impact="low" public="20191212">CVE-2019-16777</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788301" id="1788301">CVE-2019-16777 npm: Global node_modules Binary Overwrite</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788305" id="1788305">CVE-2019-16775 npm: Symlink reference outside of node_modules folder through the bin field upon installation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788310" id="1788310">CVE-2019-16776 npm: Arbitrary file write via constructed entry in the package.json bin field</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:12.14.1-1.module+el8.1.0+5466+30f75629" test_ref="oval:org.almalinux.alea:tst:20200330001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:12.14.1-1.module+el8.1.0+5466+30f75629" test_ref="oval:org.almalinux.alea:tst:20200330003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:12.14.1-1.module+el8.1.0+5466+30f75629" test_ref="oval:org.almalinux.alea:tst:20200330005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629" test_ref="oval:org.almalinux.alea:tst:20200330011"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20200343" version="635">
      <metadata>
        <title>ALEA-2020:0343: libpq bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2020:0343" ref_url="https://errata.almalinux.org/8/ALEA-2020-0343.html" source="ALSA"/>
        <reference ref_id="RHEA-2020:0343" ref_url="https://access.redhat.com/errata/RHEA-2020:0343" source="RHSA"/>
        <reference ref_id="CVE-2019-10164" ref_url="https://access.redhat.com/security/cve/CVE-2019-10164" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-10164" impact="moderate" public="20190620">CVE-2019-10164</cve>
          <bugzilla href="https://bugzilla.redhat.com/1719698" id="1719698">CVE-2019-10164 postgresql: Stack-based buffer overflow via setting a password</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libpq is earlier than 0:12.1-3.el8" test_ref="oval:org.almalinux.alea:tst:20200343001"/>
              <criterion comment="libpq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20200343002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libpq-devel is earlier than 0:12.1-3.el8" test_ref="oval:org.almalinux.alea:tst:20200343003"/>
              <criterion comment="libpq-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20200343004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20204505" version="636">
      <metadata>
        <title>ALEA-2020:4505: python-rtslib bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2020:4505" ref_url="https://errata.almalinux.org/8/ALEA-2020-4505.html" source="ALSA"/>
        <reference ref_id="RHEA-2020:4505" ref_url="https://access.redhat.com/errata/RHEA-2020:4505" source="RHSA"/>
        <reference ref_id="CVE-2020-14019" ref_url="https://access.redhat.com/security/cve/CVE-2020-14019" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cwe="CWE-282" href="https://access.redhat.com/security/cve/CVE-2020-14019" impact="moderate" public="20200619">CVE-2020-14019</cve>
          <bugzilla href="https://bugzilla.redhat.com/1854723" id="1854723">CVE-2020-14019 python-rtslib: weak permissions for /etc/target/saveconfig.json</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python3-rtslib is earlier than 0:2.1.73-2.el8" test_ref="oval:org.almalinux.alea:tst:20204505001"/>
              <criterion comment="python3-rtslib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20204505002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="target-restore is earlier than 0:2.1.73-2.el8" test_ref="oval:org.almalinux.alea:tst:20204505003"/>
              <criterion comment="target-restore is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20204505004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20211580" version="635">
      <metadata>
        <title>ALEA-2021:1580: libarchive bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2021:1580" ref_url="https://errata.almalinux.org/8/ALEA-2021-1580.html" source="ALSA"/>
        <reference ref_id="RHEA-2021:1580" ref_url="https://access.redhat.com/errata/RHEA-2021:1580" source="RHSA"/>
        <reference ref_id="CVE-2017-14502" ref_url="https://access.redhat.com/security/cve/CVE-2017-14502" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.4 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-05-18"/>
          <updated date="2021-05-18"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-193" href="https://access.redhat.com/security/cve/CVE-2017-14502" impact="moderate" public="20170916">CVE-2017-14502</cve>
          <bugzilla href="https://bugzilla.redhat.com/1494463" id="1494463">CVE-2017-14502 libarchive: Off-by-one error in the read_header function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bsdtar is earlier than 0:3.3.3-1.el8" test_ref="oval:org.almalinux.alea:tst:20211580001"/>
              <criterion comment="bsdtar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive is earlier than 0:3.3.3-1.el8" test_ref="oval:org.almalinux.alea:tst:20211580003"/>
              <criterion comment="libarchive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive-devel is earlier than 0:3.3.3-1.el8" test_ref="oval:org.almalinux.alea:tst:20211580005"/>
              <criterion comment="libarchive-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alea:def:20211906" version="635">
      <metadata>
        <title>ALEA-2021:1906: libyang bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALEA-2021:1906" ref_url="https://errata.almalinux.org/8/ALEA-2021-1906.html" source="ALSA"/>
        <reference ref_id="RHEA-2021:1906" ref_url="https://access.redhat.com/errata/RHEA-2021:1906" source="RHSA"/>
        <reference ref_id="CVE-2019-20391" ref_url="https://access.redhat.com/security/cve/CVE-2019-20391" source="CVE"/>
        <reference ref_id="CVE-2019-20392" ref_url="https://access.redhat.com/security/cve/CVE-2019-20392" source="CVE"/>
        <reference ref_id="CVE-2019-20393" ref_url="https://access.redhat.com/security/cve/CVE-2019-20393" source="CVE"/>
        <reference ref_id="CVE-2019-20394" ref_url="https://access.redhat.com/security/cve/CVE-2019-20394" source="CVE"/>
        <reference ref_id="CVE-2019-20395" ref_url="https://access.redhat.com/security/cve/CVE-2019-20395" source="CVE"/>
        <reference ref_id="CVE-2019-20396" ref_url="https://access.redhat.com/security/cve/CVE-2019-20396" source="CVE"/>
        <reference ref_id="CVE-2019-20397" ref_url="https://access.redhat.com/security/cve/CVE-2019-20397" source="CVE"/>
        <reference ref_id="CVE-2019-20398" ref_url="https://access.redhat.com/security/cve/CVE-2019-20398" source="CVE"/>
        <description>For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.4 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-05-18"/>
          <updated date="2021-05-18"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-20391" impact="low" public="20190426">CVE-2019-20391</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-20392" impact="low" public="20190307">CVE-2019-20392</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-20393" impact="moderate" public="20190329">CVE-2019-20393</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-20394" impact="moderate" public="20190426">CVE-2019-20394</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://access.redhat.com/security/cve/CVE-2019-20395" impact="low" public="20190308">CVE-2019-20395</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20396" impact="moderate" public="20190329">CVE-2019-20396</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-20397" impact="moderate" public="20190328">CVE-2019-20397</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-20398" impact="low" public="20190429">CVE-2019-20398</cve>
          <bugzilla href="https://bugzilla.redhat.com/1793922" id="1793922">CVE-2019-20392 libyang: invalid memory access when if-feature statement is used inside a list key node</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793924" id="1793924">CVE-2019-20395 libyang: stack-overflow when parsing yang files with self-referential union types</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793928" id="1793928">CVE-2019-20397 libyang: double-free in yyparse() when organization field is not terminated</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793929" id="1793929">CVE-2019-20396 libyang: heap-based buffer over-read in function lys_type_free() due to malformed pattern</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793930" id="1793930">CVE-2019-20393 libyang: double-free in function yyparse() when empty description is used</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793932" id="1793932">CVE-2019-20394 libyang: double-free in yyparse() when a type statement is used in a notification statement</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793934" id="1793934">CVE-2019-20391 libyang: invalid memory access in resolve_feature_value() when a if-feature is used inside a bit</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793935" id="1793935">CVE-2019-20398 libyang: NULL pointer dereference in function lys_extension_instances_free()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="libyang is earlier than 0:1.0.184-1.el8" test_ref="oval:org.almalinux.alea:tst:20211906001"/>
          <criterion comment="libyang is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211906002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190966" version="638">
      <metadata>
        <title>ALSA-2019:0966: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0966" ref_url="https://errata.almalinux.org/8/ALSA-2019-0966.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0966" ref_url="https://access.redhat.com/errata/RHSA-2019:0966" source="RHSA"/>
        <reference ref_id="CVE-2018-18506" ref_url="https://access.redhat.com/security/cve/CVE-2018-18506" source="CVE"/>
        <reference ref_id="CVE-2019-9788" ref_url="https://access.redhat.com/security/cve/CVE-2019-9788" source="CVE"/>
        <reference ref_id="CVE-2019-9790" ref_url="https://access.redhat.com/security/cve/CVE-2019-9790" source="CVE"/>
        <reference ref_id="CVE-2019-9791" ref_url="https://access.redhat.com/security/cve/CVE-2019-9791" source="CVE"/>
        <reference ref_id="CVE-2019-9792" ref_url="https://access.redhat.com/security/cve/CVE-2019-9792" source="CVE"/>
        <reference ref_id="CVE-2019-9793" ref_url="https://access.redhat.com/security/cve/CVE-2019-9793" source="CVE"/>
        <reference ref_id="CVE-2019-9795" ref_url="https://access.redhat.com/security/cve/CVE-2019-9795" source="CVE"/>
        <reference ref_id="CVE-2019-9796" ref_url="https://access.redhat.com/security/cve/CVE-2019-9796" source="CVE"/>
        <reference ref_id="CVE-2019-9810" ref_url="https://access.redhat.com/security/cve/CVE-2019-9810" source="CVE"/>
        <reference ref_id="CVE-2019-9813" ref_url="https://access.redhat.com/security/cve/CVE-2019-9813" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 60.6.1 ESR. (BZ#1690308)

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788)

* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790)

* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791)

* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792)

* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810)

* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)

* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793)

* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795)

* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796)

* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-18506" impact="moderate" public="20190320">CVE-2018-18506</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-9788" impact="critical" public="20190320">CVE-2019-9788</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9790" impact="critical" public="20190320">CVE-2019-9790</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-9791" impact="critical" public="20190320">CVE-2019-9791</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-203-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-9792" impact="critical" public="20190320">CVE-2019-9792</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9793" impact="important" public="20190320">CVE-2019-9793</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-9795" impact="important" public="20190320">CVE-2019-9795</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9796" impact="important" public="20190320">CVE-2019-9796</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9810" impact="critical" public="20190322">CVE-2019-9810</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-9813" impact="critical" public="20190322">CVE-2019-9813</cve>
          <bugzilla href="https://bugzilla.redhat.com/1690673" id="1690673">CVE-2018-18506 Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690674" id="1690674">CVE-2019-9788 Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690675" id="1690675">CVE-2019-9790 Mozilla: Use-after-free when removing in-use DOM elements</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690676" id="1690676">CVE-2019-9791 Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690677" id="1690677">CVE-2019-9792 Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690678" id="1690678">CVE-2019-9793 Mozilla: Improper bounds checks when Spectre mitigations are disabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690680" id="1690680">CVE-2019-9795 Mozilla: Type-confusion in IonMonkey JIT compiler</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690681" id="1690681">CVE-2019-9796 Mozilla: Use-after-free with SMIL animation controller</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692181" id="1692181">CVE-2019-9810 Mozilla: IonMonkey MArraySlice has incorrect alias information</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692182" id="1692182">CVE-2019-9813 Mozilla: Ionmonkey type confusion with __proto__ mutations</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:60.6.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20190966001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190968" version="637">
      <metadata>
        <title>ALSA-2019:0968: edk2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0968" ref_url="https://errata.almalinux.org/8/ALSA-2019-0968.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0968" ref_url="https://access.redhat.com/errata/RHSA-2019:0968" source="RHSA"/>
        <reference ref_id="CVE-2018-12180" ref_url="https://access.redhat.com/security/cve/CVE-2018-12180" source="CVE"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.

Security Fix(es):

* edk2: Buffer Overflow in BlockIo service for RAM disk (CVE-2018-12180)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-125-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2018-12180" impact="important" public="20190226">CVE-2018-12180</cve>
          <bugzilla href="https://bugzilla.redhat.com/1683372" id="1683372">CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="edk2-aarch64 is earlier than 0:20180508gitee3198e672e2-9.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190968001"/>
              <criterion comment="edk2-aarch64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="edk2-ovmf is earlier than 0:20180508gitee3198e672e2-9.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190968003"/>
              <criterion comment="edk2-ovmf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190971" version="636">
      <metadata>
        <title>ALSA-2019:0971: ghostscript security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0971" ref_url="https://errata.almalinux.org/8/ALSA-2019-0971.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0971" ref_url="https://access.redhat.com/errata/RHSA-2019:0971" source="RHSA"/>
        <reference ref_id="CVE-2019-3835" ref_url="https://access.redhat.com/security/cve/CVE-2019-3835" source="CVE"/>
        <reference ref_id="CVE-2019-3838" ref_url="https://access.redhat.com/security/cve/CVE-2019-3838" source="CVE"/>
        <reference ref_id="CVE-2019-3839" ref_url="https://access.redhat.com/security/cve/CVE-2019-3839" source="CVE"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: superexec operator is available (700585) (CVE-2019-3835)

* ghostscript: forceput in DefineResource is still accessible (700576) (CVE-2019-3838)

* ghostscript: missing attack vector protections for CVE-2019-6116 (CVE-2019-3839)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-3835" impact="important" public="20190321:1200">CVE-2019-3835</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-3838" impact="important" public="20190321:1200">CVE-2019-3838</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-3839" impact="important" public="20190502">CVE-2019-3839</cve>
          <bugzilla href="https://bugzilla.redhat.com/1673304" id="1673304">CVE-2019-3839 ghostscript: missing attack vector protections for CVE-2019-6116</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677581" id="1677581">CVE-2019-3838 ghostscript: forceput in DefineResource is still accessible (700576)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677588" id="1677588">CVE-2019-3835 ghostscript: superexec operator is available (700585)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ghostscript is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971001"/>
              <criterion comment="ghostscript is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-doc is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971003"/>
              <criterion comment="ghostscript-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-dvipdf is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971005"/>
              <criterion comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-fonts is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971007"/>
              <criterion comment="ghostscript-tools-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-printing is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971009"/>
              <criterion comment="ghostscript-tools-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-x11 is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971011"/>
              <criterion comment="ghostscript-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971013"/>
              <criterion comment="libgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs-devel is earlier than 0:9.25-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190971015"/>
              <criterion comment="libgs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190972" version="636">
      <metadata>
        <title>ALSA-2019:0972: openwsman security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0972" ref_url="https://errata.almalinux.org/8/ALSA-2019-0972.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0972" ref_url="https://access.redhat.com/errata/RHSA-2019:0972" source="RHSA"/>
        <reference ref_id="CVE-2019-3816" ref_url="https://access.redhat.com/security/cve/CVE-2019-3816" source="CVE"/>
        <description>Openwsman is a project intended to provide an open source implementation of the Web Services Management specification (WS-Management) and to expose system management information on the Linux operating system using the WS-Management protocol. WS-Management is based on a suite of web services specifications and usage requirements that cover all system management aspects.

Security Fix(es):

* openwsman: Disclosure of arbitrary files outside of the registered URIs (CVE-2019-3816)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3816" impact="important" public="20190312">CVE-2019-3816</cve>
          <bugzilla href="https://bugzilla.redhat.com/1667070" id="1667070">CVE-2019-3816 openwsman: Disclosure of arbitrary files outside of the registered URIs</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libwsman-devel is earlier than 0:2.6.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20190972001"/>
              <criterion comment="libwsman-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwsman1 is earlier than 0:2.6.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20190972003"/>
              <criterion comment="libwsman1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-client is earlier than 0:2.6.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20190972005"/>
              <criterion comment="openwsman-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-python3 is earlier than 0:2.6.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20190972007"/>
              <criterion comment="openwsman-python3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-server is earlier than 0:2.6.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20190972009"/>
              <criterion comment="openwsman-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190975" version="641">
      <metadata>
        <title>ALSA-2019:0975: container-tools:rhel8 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0975" ref_url="https://errata.almalinux.org/8/ALSA-2019-0975.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0975" ref_url="https://access.redhat.com/errata/RHSA-2019:0975" source="RHSA"/>
        <reference ref_id="CVE-2019-5736" ref_url="https://access.redhat.com/security/cve/CVE-2019-5736" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [stream rhel8] rebase container-selinux to 2.94 (BZ#1693675)

* [stream rhel8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669)

* [stream rhel8] don't allow a container to connect to random services (BZ#1695689)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-672" href="https://access.redhat.com/security/cve/CVE-2019-5736" impact="important" public="20190211:1322">CVE-2019-5736</cve>
          <bugzilla href="https://bugzilla.redhat.com/1664908" id="1664908">CVE-2019-5736 runc: Execution of malicious containers allows for container escape and access to host filesystem</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-3.gite94b4f9.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.94-1.git1e99f1d.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750031"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-3.git9ebe139.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750051"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-3.git1715c90.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750071"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-2.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750091"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750111"/>
              <criterion comment="oci-systemd-hook is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.0.0+194+ac560166" test_ref="oval:org.almalinux.alsa:tst:201909750131"/>
              <criterion comment="oci-umount is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551" test_ref="oval:org.almalinux.alsa:tst:20190975015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551" test_ref="oval:org.almalinux.alsa:tst:20190975017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-55.rc5.dev.git2abd837.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750191"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-3.git1715c90.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750211"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-2.dev.gitc4e1bc5.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201909750231"/>
              <criterion comment="slirp4netns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750242"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190980" version="637">
      <metadata>
        <title>ALSA-2019:0980: httpd:2.4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0980" ref_url="https://errata.almalinux.org/8/ALSA-2019-0980.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0980" ref_url="https://access.redhat.com/errata/RHSA-2019:0980" source="RHSA"/>
        <reference ref_id="CVE-2019-0211" ref_url="https://access.redhat.com/security/cve/CVE-2019-0211" source="CVE"/>
        <reference ref_id="CVE-2019-0215" ref_url="https://access.redhat.com/security/cve/CVE-2019-0215" source="CVE"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: privilege escalation from modules scripts (CVE-2019-0211)

* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-0211" impact="important" public="20190401">CVE-2019-0211</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0215" impact="important" public="20190401">CVE-2019-0215</cve>
          <bugzilla href="https://bugzilla.redhat.com/1694980" id="1694980">CVE-2019-0211 httpd: privilege escalation from modules scripts</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695025" id="1695025">CVE-2019-0215 httpd: mod_ssl: access control bypass when using per-location client certification authentication</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module httpd:2.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190980023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="httpd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980002"/>
              <criterion comment="httpd is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980004"/>
              <criterion comment="httpd-devel is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980006"/>
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980008"/>
              <criterion comment="httpd-manual is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980010"/>
              <criterion comment="httpd-tools is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980012"/>
              <criterion comment="mod_http2 is earlier than 0:1.11.3-2.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980014"/>
              <criterion comment="mod_ldap is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980016"/>
              <criterion comment="mod_md is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980018"/>
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980020"/>
              <criterion comment="mod_session is earlier than 0:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980022"/>
              <criterion comment="mod_ssl is earlier than 1:2.4.37-11.module+el8.0.0+2969+90015743" test_ref="oval:org.almalinux.alsa:tst:20190980021"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190981" version="637">
      <metadata>
        <title>ALSA-2019:0981: python27:2.7 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0981" ref_url="https://errata.almalinux.org/8/ALSA-2019-0981.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0981" ref_url="https://access.redhat.com/errata/RHSA-2019:0981" source="RHSA"/>
        <reference ref_id="CVE-2019-7164" ref_url="https://access.redhat.com/security/cve/CVE-2019-7164" source="CVE"/>
        <reference ref_id="CVE-2019-7548" ref_url="https://access.redhat.com/security/cve/CVE-2019-7548" source="CVE"/>
        <reference ref_id="CVE-2019-9636" ref_url="https://access.redhat.com/security/cve/CVE-2019-9636" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.

SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.

Security Fix(es):

* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)

* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)

* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://access.redhat.com/security/cve/CVE-2019-7164" impact="moderate" public="20190201">CVE-2019-7164</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2019-7548" impact="moderate" public="20190201">CVE-2019-7548</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2019-9636" impact="important" public="20190306">CVE-2019-9636</cve>
          <bugzilla href="https://bugzilla.redhat.com/1674059" id="1674059">CVE-2019-7548 python-sqlalchemy: SQL Injection when the group_by parameter can be controlled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1678520" id="1678520">CVE-2019-7164 python-sqlalchemy: SQL Injection when the order_by parameter can be controlled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688543" id="1688543">CVE-2019-9636 python: Information Disclosure due to urlsplit improper NFKC normalization</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python27:2.7 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190981119"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810011"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810012"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201909810013"/>
              <criterion comment="babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810022"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810031"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810032"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201909810033"/>
              <criterion comment="python-nose-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810051"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810052"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810053"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201909810071"/>
              <criterion comment="python-sqlalchemy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981010"/>
              <criterion comment="python2 is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810111"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810112"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810131"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810132"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810151"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810152"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810171"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810172"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201909810173"/>
              <criterion comment="python2-babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810191"/>
              <criterion comment="python2-backports is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201909810192"/>
              <criterion comment="python2-backports is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810211"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201909810212"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-9.module_el8.0.0+193+7850e68f" test_ref="oval:org.almalinux.alsa:tst:201909810231"/>
              <criterion comment="python2-bson is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810251"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810252"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810271"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810272"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981030"/>
              <criterion comment="python2-debug is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981032"/>
              <criterion comment="python2-devel is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-9.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810331"/>
              <criterion comment="python2-dns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810342"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.15-4.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810351"/>
              <criterion comment="python2-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810362"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.15-4.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810371"/>
              <criterion comment="python2-docs-info is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810382"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810391"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810392"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810411"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810412"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810431"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810432"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810451"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810452"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810471"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810472"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201909810473"/>
              <criterion comment="python2-jinja2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810482"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981050"/>
              <criterion comment="python2-libs is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981049"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810511"/>
              <criterion comment="python2-lxml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201909810512"/>
              <criterion comment="python2-lxml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810531"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810532"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810551"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810552"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810571"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810572"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201909810573"/>
              <criterion comment="python2-nose is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810582"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-10.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810591"/>
              <criterion comment="python2-numpy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810602"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-10.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810611"/>
              <criterion comment="python2-numpy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-10.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810631"/>
              <criterion comment="python2-numpy-f2py is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810642"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip is earlier than 0:9.0.3-13.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810651"/>
              <criterion comment="python2-pip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810662"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810671"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810672"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810691"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810692"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810693"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810711"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810712"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810713"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810731"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810732"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810733"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810751"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810752"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909810771"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201909810772"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201909810773"/>
              <criterion comment="python2-pygments is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810782"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-9.module_el8.0.0+193+7850e68f" test_ref="oval:org.almalinux.alsa:tst:201909810791"/>
              <criterion comment="python2-pymongo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810802"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-9.module_el8.0.0+193+7850e68f" test_ref="oval:org.almalinux.alsa:tst:201909810811"/>
              <criterion comment="python2-pymongo-gridfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810822"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810831"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810832"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810851"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810852"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810871"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810872"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810891"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810892"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810911"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810912"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-2.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201909810931"/>
              <criterion comment="python2-requests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810942"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909810951"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909810952"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-19.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909810971"/>
              <criterion comment="python2-scipy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810982"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools is earlier than 0:39.0.1-11.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201909810991"/>
              <criterion comment="python2-setuptools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811002"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201909811011"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201909811012"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201909811031"/>
              <criterion comment="python2-six is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981104"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201909811032"/>
              <criterion comment="python2-six is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-sqlalchemy is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201909811051"/>
              <criterion comment="python2-sqlalchemy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981108"/>
              <criterion comment="python2-test is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981107"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tkinter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981110"/>
              <criterion comment="python2-tkinter is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981109"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981112"/>
              <criterion comment="python2-tools is earlier than 0:2.7.15-22.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981111"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981114"/>
              <criterion comment="python2-urllib3 is earlier than 0:1.23-7.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981113"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-18.module_el8.0.0+32+017b2cba" test_ref="oval:org.almalinux.alsa:tst:201909811151"/>
              <criterion comment="python2-virtualenv is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811162"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="python2-wheel is earlier than 1:0.30.0-13.module+el8.0.0+2961+596d0223" test_ref="oval:org.almalinux.alsa:tst:20190981117"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190983" version="636">
      <metadata>
        <title>ALSA-2019:0983: wget security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0983" ref_url="https://errata.almalinux.org/8/ALSA-2019-0983.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0983" ref_url="https://access.redhat.com/errata/RHSA-2019:0983" source="RHSA"/>
        <reference ref_id="CVE-2019-5953" ref_url="https://access.redhat.com/security/cve/CVE-2019-5953" source="CVE"/>
        <description>The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.

Security Fix(es):

* wget: do_conversion() heap-based buffer overflow vulnerability (CVE-2019-5953)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-5953" impact="important" public="20190403">CVE-2019-5953</cve>
          <bugzilla href="https://bugzilla.redhat.com/1695679" id="1695679">CVE-2019-5953 wget: do_conversion() heap-based buffer overflow vulnerability</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="wget is earlier than 0:1.19.5-7.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20190983001"/>
          <criterion comment="wget is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190983002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190984" version="636">
      <metadata>
        <title>ALSA-2019:0984: python36:3.6 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0984" ref_url="https://errata.almalinux.org/8/ALSA-2019-0984.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0984" ref_url="https://access.redhat.com/errata/RHSA-2019:0984" source="RHSA"/>
        <reference ref_id="CVE-2019-7164" ref_url="https://access.redhat.com/security/cve/CVE-2019-7164" source="CVE"/>
        <reference ref_id="CVE-2019-7548" ref_url="https://access.redhat.com/security/cve/CVE-2019-7548" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases.

Security Fix(es):

* python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164)

* python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://access.redhat.com/security/cve/CVE-2019-7164" impact="moderate" public="20190201">CVE-2019-7164</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2019-7548" impact="moderate" public="20190201">CVE-2019-7548</cve>
          <bugzilla href="https://bugzilla.redhat.com/1674059" id="1674059">CVE-2019-7548 python-sqlalchemy: SQL Injection when the group_by parameter can be controlled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1678520" id="1678520">CVE-2019-7164 python-sqlalchemy: SQL Injection when the order_by parameter can be controlled</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python36:3.6 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190984041"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840011"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840012"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+666+456f5f48" test_ref="oval:org.almalinux.alsa:tst:201909840013"/>
              <criterion comment="python-nose-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-pymongo-doc is earlier than 0:3.6.1-9.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840031"/>
              <criterion comment="python-pymongo-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-1.module_el8.1.0+245+c39af44f" test_ref="oval:org.almalinux.alsa:tst:201909840051"/>
              <criterion comment="python-sqlalchemy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-virtualenv-doc is earlier than 0:15.1.0-18.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840071"/>
              <criterion comment="python-virtualenv-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-PyMySQL is earlier than 0:0.8.0-10.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840091"/>
              <criterion comment="python3-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-PyMySQL is earlier than 0:0.8.0-10.module_el8.3.0+562+e162826a" test_ref="oval:org.almalinux.alsa:tst:201909840092"/>
              <criterion comment="python3-PyMySQL is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840102"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bson is earlier than 0:3.6.1-9.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840111"/>
              <criterion comment="python3-bson is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-docs is earlier than 0:3.6.7-2.module_el8.5.0+2569+5c5719bc" test_ref="oval:org.almalinux.alsa:tst:201909840131"/>
              <criterion comment="python3-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-docs is earlier than 0:3.6.7-2.module_el8.5.0+135+5ce32bc4" test_ref="oval:org.almalinux.alsa:tst:201909840132"/>
              <criterion comment="python3-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-docutils is earlier than 0:0.14-12.module_el8.5.0+2569+5c5719bc" test_ref="oval:org.almalinux.alsa:tst:201909840151"/>
              <criterion comment="python3-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-docutils is earlier than 0:0.14-12.module_el8.5.0+135+5ce32bc4" test_ref="oval:org.almalinux.alsa:tst:201909840152"/>
              <criterion comment="python3-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nose is earlier than 0:1.3.7-30.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840171"/>
              <criterion comment="python3-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nose is earlier than 0:1.3.7-30.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840172"/>
              <criterion comment="python3-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nose is earlier than 0:1.3.7-30.module_el8.4.0+666+456f5f48" test_ref="oval:org.almalinux.alsa:tst:201909840173"/>
              <criterion comment="python3-nose is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pygments is earlier than 0:2.2.0-20.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840191"/>
              <criterion comment="python3-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984020"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pygments is earlier than 0:2.2.0-20.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840192"/>
              <criterion comment="python3-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984020"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pygments is earlier than 0:2.2.0-20.module_el8.4.0+790+083e3d81" test_ref="oval:org.almalinux.alsa:tst:201909840193"/>
              <criterion comment="python3-pygments is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840202"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pymongo is earlier than 0:3.6.1-9.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840211"/>
              <criterion comment="python3-pymongo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pymongo-gridfs is earlier than 0:3.6.1-9.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840231"/>
              <criterion comment="python3-pymongo-gridfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-scipy is earlier than 0:1.0.0-19.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840251"/>
              <criterion comment="python3-scipy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-sqlalchemy is earlier than 0:1.3.2-1.module_el8.1.0+245+c39af44f" test_ref="oval:org.almalinux.alsa:tst:201909840271"/>
              <criterion comment="python3-sqlalchemy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-virtualenv is earlier than 0:15.1.0-18.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840291"/>
              <criterion comment="python3-virtualenv is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-wheel is earlier than 1:0.30.0-13.module_el8.0.0+33+0a10c0e1" test_ref="oval:org.almalinux.alsa:tst:201909840311"/>
              <criterion comment="python3-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840322"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36 is earlier than 0:3.6.8-2.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840331"/>
              <criterion comment="python36 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36 is earlier than 0:3.6.8-2.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840332"/>
              <criterion comment="python36 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36 is earlier than 0:3.6.8-2.module_el8.4.0+790+083e3d81" test_ref="oval:org.almalinux.alsa:tst:201909840333"/>
              <criterion comment="python36 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-debug is earlier than 0:3.6.8-2.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840351"/>
              <criterion comment="python36-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-debug is earlier than 0:3.6.8-2.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840352"/>
              <criterion comment="python36-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-debug is earlier than 0:3.6.8-2.module_el8.4.0+790+083e3d81" test_ref="oval:org.almalinux.alsa:tst:201909840353"/>
              <criterion comment="python36-debug is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-devel is earlier than 0:3.6.8-2.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840371"/>
              <criterion comment="python36-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-devel is earlier than 0:3.6.8-2.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840372"/>
              <criterion comment="python36-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-devel is earlier than 0:3.6.8-2.module_el8.4.0+790+083e3d81" test_ref="oval:org.almalinux.alsa:tst:201909840373"/>
              <criterion comment="python36-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840382"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-rpm-macros is earlier than 0:3.6.8-2.module_el8.3.0+6191+6b4b10ec" test_ref="oval:org.almalinux.alsa:tst:201909840391"/>
              <criterion comment="python36-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984040"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-rpm-macros is earlier than 0:3.6.8-2.module_el8.4.0+2301+1849b5f9" test_ref="oval:org.almalinux.alsa:tst:201909840392"/>
              <criterion comment="python36-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190984040"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python36-rpm-macros is earlier than 0:3.6.8-2.module_el8.4.0+790+083e3d81" test_ref="oval:org.almalinux.alsa:tst:201909840393"/>
              <criterion comment="python36-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909840402"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190985" version="634">
      <metadata>
        <title>ALSA-2019:0985: mod_auth_mellon security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0985" ref_url="https://errata.almalinux.org/8/ALSA-2019-0985.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0985" ref_url="https://access.redhat.com/errata/RHSA-2019:0985" source="RHSA"/>
        <reference ref_id="CVE-2019-3878" ref_url="https://access.redhat.com/security/cve/CVE-2019-3878" source="CVE"/>
        <description>The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.

Security Fix(es):

* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-305" href="https://access.redhat.com/security/cve/CVE-2019-3878" impact="important" public="20180510">CVE-2019-3878</cve>
          <bugzilla href="https://bugzilla.redhat.com/1691126" id="1691126">CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="mod_auth_mellon is earlier than 0:0.14.0-3.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20190985001"/>
          <criterion comment="mod_auth_mellon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190985002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190990" version="636">
      <metadata>
        <title>ALSA-2019:0990: systemd security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0990" ref_url="https://errata.almalinux.org/8/ALSA-2019-0990.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0990" ref_url="https://access.redhat.com/errata/RHSA-2019:0990" source="RHSA"/>
        <reference ref_id="CVE-2019-6454" ref_url="https://access.redhat.com/security/cve/CVE-2019-6454" source="CVE"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash (CVE-2019-6454)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [PATCH] bus-socket: Fix line_begins() to accept word matching full (BZ#1693578)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6454" impact="moderate" public="20190218">CVE-2019-6454</cve>
          <bugzilla href="https://bugzilla.redhat.com/1667032" id="1667032">CVE-2019-6454 systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="systemd is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990001"/>
              <criterion comment="systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-container is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990003"/>
              <criterion comment="systemd-container is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-devel is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990005"/>
              <criterion comment="systemd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-journal-remote is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990007"/>
              <criterion comment="systemd-journal-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-libs is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990009"/>
              <criterion comment="systemd-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-pam is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990011"/>
              <criterion comment="systemd-pam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-tests is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990013"/>
              <criterion comment="systemd-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-udev is earlier than 0:239-13.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20190990015"/>
              <criterion comment="systemd-udev is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20190997" version="637">
      <metadata>
        <title>ALSA-2019:0997: python3 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:0997" ref_url="https://errata.almalinux.org/8/ALSA-2019-0997.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:0997" ref_url="https://access.redhat.com/errata/RHSA-2019:0997" source="RHSA"/>
        <reference ref_id="CVE-2019-9636" ref_url="https://access.redhat.com/security/cve/CVE-2019-9636" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 

This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.

Security Fix(es):

* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-07"/>
          <updated date="2019-05-07"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2019-9636" impact="important" public="20190306">CVE-2019-9636</cve>
          <bugzilla href="https://bugzilla.redhat.com/1688543" id="1688543">CVE-2019-9636 python: Information Disclosure due to urlsplit improper NFKC normalization</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997001"/>
              <criterion comment="platform-python is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-debug is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997003"/>
              <criterion comment="platform-python-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-devel is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997005"/>
              <criterion comment="platform-python-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-idle is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997007"/>
              <criterion comment="python3-idle is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libs is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997009"/>
              <criterion comment="python3-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-test is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997011"/>
              <criterion comment="python3-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-tkinter is earlier than 0:3.6.8-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20190997013"/>
              <criterion comment="python3-tkinter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191142" version="635">
      <metadata>
        <title>ALSA-2019:1142: freeradius:3.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1142" ref_url="https://errata.almalinux.org/8/ALSA-2019-1142.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1142" ref_url="https://access.redhat.com/errata/RHSA-2019:1142" source="RHSA"/>
        <reference ref_id="CVE-2019-11234" ref_url="https://access.redhat.com/security/cve/CVE-2019-11234" source="CVE"/>
        <reference ref_id="CVE-2019-11235" ref_url="https://access.redhat.com/security/cve/CVE-2019-11235" source="CVE"/>
        <description>FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* freeradius: eap-pwd: authentication bypass via an invalid curve attack (CVE-2019-11235)

* freeradius: eap-pwd: fake authentication using reflection (CVE-2019-11234)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="5.0/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2019-11234" impact="moderate" public="20190410:1500">CVE-2019-11234</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-345" href="https://access.redhat.com/security/cve/CVE-2019-11235" impact="important" public="20190410:1500">CVE-2019-11235</cve>
          <bugzilla href="https://bugzilla.redhat.com/1695748" id="1695748">CVE-2019-11235 freeradius: eap-pwd: authentication bypass via an invalid curve attack</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695783" id="1695783">CVE-2019-11234 freeradius: eap-pwd: fake authentication using reflection</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module freeradius:3.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191142025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420011"/>
              <criterion comment="freeradius is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420031"/>
              <criterion comment="freeradius-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420051"/>
              <criterion comment="freeradius-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420071"/>
              <criterion comment="freeradius-krb5 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420091"/>
              <criterion comment="freeradius-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420111"/>
              <criterion comment="freeradius-mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420131"/>
              <criterion comment="freeradius-perl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420151"/>
              <criterion comment="freeradius-postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420171"/>
              <criterion comment="freeradius-rest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420191"/>
              <criterion comment="freeradius-sqlite is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420211"/>
              <criterion comment="freeradius-unixODBC is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.17-4.module_el8.0.0+61+f432573d" test_ref="oval:org.almalinux.alsa:tst:201911420231"/>
              <criterion comment="freeradius-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420242"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191143" version="635">
      <metadata>
        <title>ALSA-2019:1143: flatpak security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1143" ref_url="https://errata.almalinux.org/8/ALSA-2019-1143.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1143" ref_url="https://access.redhat.com/errata/RHSA-2019:1143" source="RHSA"/>
        <reference ref_id="CVE-2019-10063" ref_url="https://access.redhat.com/security/cve/CVE-2019-10063" source="CVE"/>
        <description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

Security Fix(es):

* flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226) (CVE-2019-10063)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-266" href="https://access.redhat.com/security/cve/CVE-2019-10063" impact="important" public="20190322">CVE-2019-10063</cve>
          <bugzilla href="https://bugzilla.redhat.com/1695973" id="1695973">CVE-2019-10063 flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="flatpak is earlier than 0:1.0.6-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191143001"/>
              <criterion comment="flatpak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191143002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="flatpak-libs is earlier than 0:1.0.6-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191143003"/>
              <criterion comment="flatpak-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191143004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191144" version="639">
      <metadata>
        <title>ALSA-2019:1144: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1144" ref_url="https://errata.almalinux.org/8/ALSA-2019-1144.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1144" ref_url="https://access.redhat.com/errata/RHSA-2019:1144" source="RHSA"/>
        <reference ref_id="CVE-2018-18356" ref_url="https://access.redhat.com/security/cve/CVE-2018-18356" source="CVE"/>
        <reference ref_id="CVE-2018-18506" ref_url="https://access.redhat.com/security/cve/CVE-2018-18506" source="CVE"/>
        <reference ref_id="CVE-2018-18509" ref_url="https://access.redhat.com/security/cve/CVE-2018-18509" source="CVE"/>
        <reference ref_id="CVE-2019-5785" ref_url="https://access.redhat.com/security/cve/CVE-2019-5785" source="CVE"/>
        <reference ref_id="CVE-2019-9788" ref_url="https://access.redhat.com/security/cve/CVE-2019-9788" source="CVE"/>
        <reference ref_id="CVE-2019-9790" ref_url="https://access.redhat.com/security/cve/CVE-2019-9790" source="CVE"/>
        <reference ref_id="CVE-2019-9791" ref_url="https://access.redhat.com/security/cve/CVE-2019-9791" source="CVE"/>
        <reference ref_id="CVE-2019-9792" ref_url="https://access.redhat.com/security/cve/CVE-2019-9792" source="CVE"/>
        <reference ref_id="CVE-2019-9793" ref_url="https://access.redhat.com/security/cve/CVE-2019-9793" source="CVE"/>
        <reference ref_id="CVE-2019-9795" ref_url="https://access.redhat.com/security/cve/CVE-2019-9795" source="CVE"/>
        <reference ref_id="CVE-2019-9796" ref_url="https://access.redhat.com/security/cve/CVE-2019-9796" source="CVE"/>
        <reference ref_id="CVE-2019-9810" ref_url="https://access.redhat.com/security/cve/CVE-2019-9810" source="CVE"/>
        <reference ref_id="CVE-2019-9813" ref_url="https://access.redhat.com/security/cve/CVE-2019-9813" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.6.1. (BZ#1692449)

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788)

* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790)

* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791)

* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792)

* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810)

* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)

* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793)

* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795)

* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796)

* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-18356" impact="important" public="20181204">CVE-2018-18356</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-18506" impact="moderate" public="20190320">CVE-2018-18506</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-451-&gt;CWE-347" href="https://access.redhat.com/security/cve/CVE-2018-18509" impact="moderate" public="20190214">CVE-2018-18509</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-5785" impact="important" public="20190212">CVE-2019-5785</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-9788" impact="critical" public="20190320">CVE-2019-9788</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9790" impact="critical" public="20190320">CVE-2019-9790</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-9791" impact="critical" public="20190320">CVE-2019-9791</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-203-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-9792" impact="critical" public="20190320">CVE-2019-9792</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9793" impact="important" public="20190320">CVE-2019-9793</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-9795" impact="important" public="20190320">CVE-2019-9795</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9796" impact="important" public="20190320">CVE-2019-9796</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9810" impact="critical" public="20190322">CVE-2019-9810</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-9813" impact="critical" public="20190322">CVE-2019-9813</cve>
          <bugzilla href="https://bugzilla.redhat.com/1656570" id="1656570">CVE-2018-18356 chromium-browser, mozilla: Use after free in Skia</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676991" id="1676991">CVE-2019-5785 mozilla: Integer overflow in Skia</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677613" id="1677613">CVE-2018-18509 thunderbird: flaw in verification of S/MIME signature resulting in signature spoofing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690673" id="1690673">CVE-2018-18506 Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690674" id="1690674">CVE-2019-9788 Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690675" id="1690675">CVE-2019-9790 Mozilla: Use-after-free when removing in-use DOM elements</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690676" id="1690676">CVE-2019-9791 Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690677" id="1690677">CVE-2019-9792 Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690678" id="1690678">CVE-2019-9793 Mozilla: Improper bounds checks when Spectre mitigations are disabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690680" id="1690680">CVE-2019-9795 Mozilla: Type-confusion in IonMonkey JIT compiler</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1690681" id="1690681">CVE-2019-9796 Mozilla: Use-after-free with SMIL animation controller</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692181" id="1692181">CVE-2019-9810 Mozilla: IonMonkey MArraySlice has incorrect alias information</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1692182" id="1692182">CVE-2019-9813 Mozilla: Ionmonkey type confusion with __proto__ mutations</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:60.6.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20191144001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191145" version="635">
      <metadata>
        <title>ALSA-2019:1145: bind security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1145" ref_url="https://errata.almalinux.org/8/ALSA-2019-1145.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1145" ref_url="https://access.redhat.com/errata/RHSA-2019:1145" source="RHSA"/>
        <reference ref_id="CVE-2018-5743" ref_url="https://access.redhat.com/security/cve/CVE-2018-5743" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2018-5743" impact="important" public="20190424">CVE-2018-5743</cve>
          <bugzilla href="https://bugzilla.redhat.com/1702541" id="1702541">CVE-2018-5743 bind: Limiting simultaneous TCP clients is ineffective</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.4-17.P2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191145033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191146" version="635">
      <metadata>
        <title>ALSA-2019:1146: java-1.8.0-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1146" ref_url="https://errata.almalinux.org/8/ALSA-2019-1146.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1146" ref_url="https://access.redhat.com/errata/RHSA-2019:1146" source="RHSA"/>
        <reference ref_id="CVE-2019-2602" ref_url="https://access.redhat.com/security/cve/CVE-2019-2602" source="CVE"/>
        <reference ref_id="CVE-2019-2684" ref_url="https://access.redhat.com/security/cve/CVE-2019-2684" source="CVE"/>
        <reference ref_id="CVE-2019-2698" ref_url="https://access.redhat.com/security/cve/CVE-2019-2698" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698)

* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)

* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2602" impact="moderate" public="20190416">CVE-2019-2602</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2684" impact="moderate" public="20190416">CVE-2019-2684</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-2698" impact="important" public="20190416">CVE-2019-2698</cve>
          <bugzilla href="https://bugzilla.redhat.com/1700440" id="1700440">CVE-2019-2602 OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700447" id="1700447">CVE-2019-2698 OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700564" id="1700564">CVE-2019-2684 OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.212.b04-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191146015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191152" version="636">
      <metadata>
        <title>ALSA-2019:1152: python-jinja2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1152" ref_url="https://errata.almalinux.org/8/ALSA-2019-1152.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1152" ref_url="https://access.redhat.com/errata/RHSA-2019:1152" source="RHSA"/>
        <reference ref_id="CVE-2019-10906" ref_url="https://access.redhat.com/security/cve/CVE-2019-10906" source="CVE"/>
        <description>The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. 

Security Fix(es):

* python-jinja2: str.format_map allows sandbox escape (CVE-2019-10906)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-13"/>
          <updated date="2019-05-13"/>
          <cve cvss3="9.0/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2019-10906" impact="important" public="20190406">CVE-2019-10906</cve>
          <bugzilla href="https://bugzilla.redhat.com/1698839" id="1698839">CVE-2019-10906 python-jinja2: str.format_map allows sandbox escape</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="python3-jinja2 is earlier than 0:2.10.1-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191152001"/>
          <criterion comment="python3-jinja2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191152002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191167" version="643">
      <metadata>
        <title>ALSA-2019:1167: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1167" ref_url="https://errata.almalinux.org/8/ALSA-2019-1167.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1167" ref_url="https://access.redhat.com/errata/RHSA-2019:1167" source="RHSA"/>
        <reference ref_id="CVE-2018-12126" ref_url="https://access.redhat.com/security/cve/CVE-2018-12126" source="CVE"/>
        <reference ref_id="CVE-2018-12127" ref_url="https://access.redhat.com/security/cve/CVE-2018-12127" source="CVE"/>
        <reference ref_id="CVE-2018-12130" ref_url="https://access.redhat.com/security/cve/CVE-2018-12130" source="CVE"/>
        <reference ref_id="CVE-2019-11091" ref_url="https://access.redhat.com/security/cve/CVE-2019-11091" source="CVE"/>
        <reference ref_id="CVE-2019-9003" ref_url="https://access.redhat.com/security/cve/CVE-2019-9003" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache.  If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches.  This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)

* Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'.  As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

* Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127)

* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Need to remove radix-tree symbols from the whitelist (BZ#1696222)

* Installation of kernel-modules-extra rpm conflicts with kmod weak-modules (BZ#1703395)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-14"/>
          <updated date="2019-05-14"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12126" impact="moderate" public="20190514:1700">CVE-2018-12126</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12127" impact="moderate" public="20190514:1700">CVE-2018-12127</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-203-&gt;CWE-385-&gt;CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12130" impact="important" public="20190514:1700">CVE-2018-12130</cve>
          <cve cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-11091" impact="moderate" public="20190514:1700">CVE-2019-11091</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9003" impact="low" public="20190116">CVE-2019-9003</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646781" id="1646781">CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1646784" id="1646784">CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1667782" id="1667782">CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1681007" id="1681007">CVE-2019-9003 kernel: use-after-free and OOPS in drivers/char/ipmi/ipmi_msghandler.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705312" id="1705312">CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.1.2.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191167051"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.1.2.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191167052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.1.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191167049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191174" version="640">
      <metadata>
        <title>ALSA-2019:1174: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1174" ref_url="https://errata.almalinux.org/8/ALSA-2019-1174.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1174" ref_url="https://access.redhat.com/errata/RHSA-2019:1174" source="RHSA"/>
        <reference ref_id="CVE-2018-12126" ref_url="https://access.redhat.com/security/cve/CVE-2018-12126" source="CVE"/>
        <reference ref_id="CVE-2018-12127" ref_url="https://access.redhat.com/security/cve/CVE-2018-12127" source="CVE"/>
        <reference ref_id="CVE-2018-12130" ref_url="https://access.redhat.com/security/cve/CVE-2018-12130" source="CVE"/>
        <reference ref_id="CVE-2019-11091" ref_url="https://access.redhat.com/security/cve/CVE-2019-11091" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache.  If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches.  This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)

* Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'.  As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

* Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127)

* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-14"/>
          <updated date="2019-05-14"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12126" impact="moderate" public="20190514:1700">CVE-2018-12126</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12127" impact="moderate" public="20190514:1700">CVE-2018-12127</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-203-&gt;CWE-385-&gt;CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12130" impact="important" public="20190514:1700">CVE-2018-12130</cve>
          <cve cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-11091" impact="moderate" public="20190514:1700">CVE-2019-11091</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646781" id="1646781">CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1646784" id="1646784">CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1667782" id="1667782">CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705312" id="1705312">CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.1.2.rt9.145.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191167051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.1.2.rt9.145.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191174026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.1.2.rt9.145.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191174023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191175" version="641">
      <metadata>
        <title>ALSA-2019:1175: virt:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1175" ref_url="https://errata.almalinux.org/8/ALSA-2019-1175.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1175" ref_url="https://access.redhat.com/errata/RHSA-2019:1175" source="RHSA"/>
        <reference ref_id="CVE-2018-12126" ref_url="https://access.redhat.com/security/cve/CVE-2018-12126" source="CVE"/>
        <reference ref_id="CVE-2018-12127" ref_url="https://access.redhat.com/security/cve/CVE-2018-12127" source="CVE"/>
        <reference ref_id="CVE-2018-12130" ref_url="https://access.redhat.com/security/cve/CVE-2018-12130" source="CVE"/>
        <reference ref_id="CVE-2018-20815" ref_url="https://access.redhat.com/security/cve/CVE-2018-20815" source="CVE"/>
        <reference ref_id="CVE-2019-11091" ref_url="https://access.redhat.com/security/cve/CVE-2019-11091" source="CVE"/>
        <reference ref_id="CVE-2019-3855" ref_url="https://access.redhat.com/security/cve/CVE-2019-3855" source="CVE"/>
        <reference ref_id="CVE-2019-3856" ref_url="https://access.redhat.com/security/cve/CVE-2019-3856" source="CVE"/>
        <reference ref_id="CVE-2019-3857" ref_url="https://access.redhat.com/security/cve/CVE-2019-3857" source="CVE"/>
        <reference ref_id="CVE-2019-3863" ref_url="https://access.redhat.com/security/cve/CVE-2019-3863" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache.  If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches.  This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)

* Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'.  As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)

* Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127)

* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)

* QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815)

* libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855)

* libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856)

* libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857)

* libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-14"/>
          <updated date="2019-05-14"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12126" impact="moderate" public="20190514:1700">CVE-2018-12126</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-12127" impact="moderate" public="20190514:1700">CVE-2018-12127</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-203-&gt;CWE-385-&gt;CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12130" impact="important" public="20190514:1700">CVE-2018-12130</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2018-20815" impact="important" public="20181214">CVE-2018-20815</cve>
          <cve cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-226-&gt;CWE-203-&gt;CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-11091" impact="moderate" public="20190514:1700">CVE-2019-11091</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-3855" impact="important" public="20190313">CVE-2019-3855</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-3856" impact="important" public="20190313">CVE-2019-3856</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-3857" impact="important" public="20190313">CVE-2019-3857</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-3863" impact="important" public="20190313">CVE-2019-3863</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646781" id="1646781">CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1646784" id="1646784">CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1667782" id="1667782">CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1687303" id="1687303">CVE-2019-3855 libssh2: Integer overflow in transport read resulting in out of bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1687304" id="1687304">CVE-2019-3856 libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1687305" id="1687305">CVE-2019-3857 libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1687313" id="1687313">CVE-2019-3863 libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1693101" id="1693101">CVE-2018-20815 QEMU: device_tree: heap buffer overflow while loading device tree blob</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705312" id="1705312">CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="SLOF is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175002"/>
              <criterion comment="SLOF is earlier than 0:20171214-5.gitfa98132.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
              <criterion comment="hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
              <criterion comment="hivex-devel is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175008"/>
              <criterion comment="libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175010"/>
              <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-benchmarking is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175012"/>
              <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175014"/>
              <criterion comment="libguestfs-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gfs2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175016"/>
              <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175018"/>
              <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175020"/>
              <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-inspect-icons is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175022"/>
              <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175024"/>
              <criterion comment="libguestfs-java is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175026"/>
              <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175028"/>
              <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-ja is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175030"/>
              <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-uk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175032"/>
              <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rescue is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175034"/>
              <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rsync is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175036"/>
              <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175038"/>
              <criterion comment="libguestfs-tools is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools-c is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175040"/>
              <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
              <criterion comment="libguestfs-winsupport is earlier than 0:8.0-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-xfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175044"/>
              <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
              <criterion comment="libiscsi is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
              <criterion comment="libiscsi-devel is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
              <criterion comment="libiscsi-utils is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175049"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libssh2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175052"/>
              <criterion comment="libssh2 is earlier than 0:1.8.0-7.module+el8.0.0+3075+09be6b65.1" test_ref="oval:org.almalinux.alsa:tst:20191175051"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
              <criterion comment="libvirt is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175053"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
              <criterion comment="libvirt-admin is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175055"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
              <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175057"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
              <criterion comment="libvirt-client is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175059"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
              <criterion comment="libvirt-daemon is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175061"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
              <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175063"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
              <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175065"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
              <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175067"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
              <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175069"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
              <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175071"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
              <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175073"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
              <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175075"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
              <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175077"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
              <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175079"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
              <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175081"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
              <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175083"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
              <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175085"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
              <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175087"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
              <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175089"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
              <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175091"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
              <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175093"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
              <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175095"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
              <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175097"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
              <criterion comment="libvirt-dbus is earlier than 0:1.2.0-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175099"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
              <criterion comment="libvirt-devel is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175101"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
              <criterion comment="libvirt-docs is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175103"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
              <criterion comment="libvirt-libs is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175105"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
              <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175107"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
              <criterion comment="libvirt-nss is earlier than 0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9" test_ref="oval:org.almalinux.alsa:tst:20191175109"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="lua-guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175112"/>
              <criterion comment="lua-guestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175111"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
              <criterion comment="nbdkit is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175113"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
              <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175115"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
              <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175117"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
              <criterion comment="nbdkit-devel is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175119"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
              <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175121"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-gzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175124"/>
              <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175123"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175126"/>
              <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175125"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175128"/>
              <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175127"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-vddk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175130"/>
              <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175129"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-xz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175132"/>
              <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175131"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
              <criterion comment="netcf is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175133"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
              <criterion comment="netcf-devel is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175135"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
              <criterion comment="netcf-libs is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175137"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175140"/>
              <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175139"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
              <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175141"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
              <criterion comment="perl-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175143"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
              <criterion comment="python3-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175145"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175148"/>
              <criterion comment="python3-libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175147"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
              <criterion comment="python3-libvirt is earlier than 0:4.5.0-1.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175149"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-guest-agent is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175152"/>
              <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175151"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-img is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175154"/>
              <criterion comment="qemu-img is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175153"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175156"/>
              <criterion comment="qemu-kvm is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175155"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-curl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175158"/>
              <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175157"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175160"/>
              <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175159"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175162"/>
              <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175161"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175164"/>
              <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175163"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-ssh is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175166"/>
              <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175165"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175168"/>
              <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175167"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175170"/>
              <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175169"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
              <criterion comment="ruby-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175171"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175174"/>
              <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175173"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175176"/>
              <criterion comment="seabios is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175175"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175178"/>
              <criterion comment="seabios-bin is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175177"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seavgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175180"/>
              <criterion comment="seavgabios-bin is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175179"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
              <criterion comment="sgabios is earlier than 1:0.20170427git-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175181"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
              <criterion comment="sgabios-bin is earlier than 1:0.20170427git-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175183"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
              <criterion comment="supermin is earlier than 0:5.1.19-8.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175185"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
              <criterion comment="supermin-devel is earlier than 0:5.1.19-8.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175187"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-dib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175190"/>
              <criterion comment="virt-dib is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175189"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-p2v-maker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175192"/>
              <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175191"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-v2v is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175194"/>
              <criterion comment="virt-v2v is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175193"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191238" version="636">
      <metadata>
        <title>ALSA-2019:1238: java-1.8.0-ibm security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1238" ref_url="https://errata.almalinux.org/8/ALSA-2019-1238.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1238" ref_url="https://access.redhat.com/errata/RHSA-2019:1238" source="RHSA"/>
        <reference ref_id="CVE-2018-11212" ref_url="https://access.redhat.com/security/cve/CVE-2018-11212" source="CVE"/>
        <reference ref_id="CVE-2018-12547" ref_url="https://access.redhat.com/security/cve/CVE-2018-12547" source="CVE"/>
        <reference ref_id="CVE-2018-12549" ref_url="https://access.redhat.com/security/cve/CVE-2018-12549" source="CVE"/>
        <reference ref_id="CVE-2019-10245" ref_url="https://access.redhat.com/security/cve/CVE-2019-10245" source="CVE"/>
        <reference ref_id="CVE-2019-2422" ref_url="https://access.redhat.com/security/cve/CVE-2019-2422" source="CVE"/>
        <reference ref_id="CVE-2019-2449" ref_url="https://access.redhat.com/security/cve/CVE-2019-2449" source="CVE"/>
        <reference ref_id="CVE-2019-2602" ref_url="https://access.redhat.com/security/cve/CVE-2019-2602" source="CVE"/>
        <reference ref_id="CVE-2019-2684" ref_url="https://access.redhat.com/security/cve/CVE-2019-2684" source="CVE"/>
        <reference ref_id="CVE-2019-2697" ref_url="https://access.redhat.com/security/cve/CVE-2019-2697" source="CVE"/>
        <reference ref_id="CVE-2019-2698" ref_url="https://access.redhat.com/security/cve/CVE-2019-2698" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR5-FP35.

Security Fix(es):

* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)

* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)

* Oracle JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) (CVE-2019-2697)

* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698)

* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)

* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)

* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)

* IBM JDK: Read beyond the end of bytecode array causing JVM crash (CVE-2019-10245)

* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)

* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-16"/>
          <updated date="2019-05-16"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2018-11212" impact="low" public="20180516">CVE-2018-11212</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2018-12547" impact="critical" public="20190301">CVE-2018-12547</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-12549" impact="critical" public="20190301">CVE-2018-12549</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-10245" impact="moderate" public="20190430">CVE-2019-10245</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-2422" impact="moderate" public="20190115">CVE-2019-2422</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2449" impact="low" public="20190115">CVE-2019-2449</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2602" impact="moderate" public="20190416">CVE-2019-2602</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2684" impact="moderate" public="20190416">CVE-2019-2684</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2697" impact="important" public="20190416">CVE-2019-2697</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-2698" impact="important" public="20190416">CVE-2019-2698</cve>
          <bugzilla href="https://bugzilla.redhat.com/1579973" id="1579973">CVE-2018-11212 libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1665945" id="1665945">CVE-2019-2422 OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685601" id="1685601">CVE-2019-2449 Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685611" id="1685611">CVE-2018-12547 IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685717" id="1685717">CVE-2018-12549 IBM JDK: missing null check when accelerating Unsafe calls</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700440" id="1700440">CVE-2019-2602 OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700447" id="1700447">CVE-2019-2698 OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700564" id="1700564">CVE-2019-2684 OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1704480" id="1704480">CVE-2019-2697 Oracle JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1704799" id="1704799">CVE-2019-10245 IBM JDK: Read beyond the end of bytecode array causing JVM crash</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.5.35-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191238015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191259" version="638">
      <metadata>
        <title>ALSA-2019:1259: dotnet security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1259" ref_url="https://errata.almalinux.org/8/ALSA-2019-1259.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1259" ref_url="https://access.redhat.com/errata/RHSA-2019:1259" source="RHSA"/>
        <reference ref_id="CVE-2019-0757" ref_url="https://access.redhat.com/security/cve/CVE-2019-0757" source="CVE"/>
        <reference ref_id="CVE-2019-0820" ref_url="https://access.redhat.com/security/cve/CVE-2019-0820" source="CVE"/>
        <reference ref_id="CVE-2019-0980" ref_url="https://access.redhat.com/security/cve/CVE-2019-0980" source="CVE"/>
        <reference ref_id="CVE-2019-0981" ref_url="https://access.redhat.com/security/cve/CVE-2019-0981" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

A new version of .NET Core that address security vulnerabilities is now available. The updated version is .NET Core Runtime 2.1.11 and SDK 2.1.507.

Security Fix(es):

* dotnet: NuGet Tampering Vulnerability (CVE-2019-0757)

* dotnet: timeouts for regular expressions are not enforced (CVE-2019-0820)

* dotnet: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0980)

* dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0981)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* dotnet: new SocketException((int)SocketError.InvalidArgument).Message is empty (BZ#1712471)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-22"/>
          <updated date="2019-05-22"/>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2019-0757" impact="important" public="20190312:1733">CVE-2019-0757</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-0820" impact="moderate" public="20190514">CVE-2019-0820</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-0980" impact="moderate" public="20190514">CVE-2019-0980</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-0981" impact="moderate" public="20190514">CVE-2019-0981</cve>
          <bugzilla href="https://bugzilla.redhat.com/1685475" id="1685475">CVE-2019-0757 dotnet: NuGet Tampering Vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705502" id="1705502">CVE-2019-0980 dotnet: infinite loop in Uri.TryCreate leading to ASP.Net Core Denial of Service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705504" id="1705504">CVE-2019-0981 dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705506" id="1705506">CVE-2019-0820 dotnet: timeouts for regular expressions are not enforced</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:2.1.507-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259001"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:2.1.11-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259003"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.11-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259005"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.11-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259007"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.507-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259009"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.507-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191259011"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191268" version="635">
      <metadata>
        <title>ALSA-2019:1268: virt:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1268" ref_url="https://errata.almalinux.org/8/ALSA-2019-1268.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1268" ref_url="https://access.redhat.com/errata/RHSA-2019:1268" source="RHSA"/>
        <reference ref_id="CVE-2019-10132" ref_url="https://access.redhat.com/security/cve/CVE-2019-10132" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter (CVE-2019-10132)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-23"/>
          <updated date="2019-05-23"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2019-10132" impact="important" public="20190521:1200">CVE-2019-10132</cve>
          <bugzilla href="https://bugzilla.redhat.com/1706067" id="1706067">CVE-2019-10132 libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="SLOF is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175002"/>
              <criterion comment="SLOF is earlier than 0:20171214-5.gitfa98132.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
              <criterion comment="hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
              <criterion comment="hivex-devel is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175008"/>
              <criterion comment="libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175010"/>
              <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-benchmarking is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175012"/>
              <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175014"/>
              <criterion comment="libguestfs-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gfs2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175016"/>
              <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175018"/>
              <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175020"/>
              <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-inspect-icons is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175022"/>
              <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175024"/>
              <criterion comment="libguestfs-java is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175026"/>
              <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175028"/>
              <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-ja is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175030"/>
              <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-uk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175032"/>
              <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rescue is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175034"/>
              <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rsync is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175036"/>
              <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175038"/>
              <criterion comment="libguestfs-tools is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools-c is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175040"/>
              <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
              <criterion comment="libguestfs-winsupport is earlier than 0:8.0-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-xfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175044"/>
              <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
              <criterion comment="libiscsi is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
              <criterion comment="libiscsi-devel is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
              <criterion comment="libiscsi-utils is earlier than 0:1.18.0-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175049"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libssh2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175052"/>
              <criterion comment="libssh2 is earlier than 0:1.8.0-7.module+el8.0.0+3075+09be6b65.1" test_ref="oval:org.almalinux.alsa:tst:20191175051"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
              <criterion comment="libvirt is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268053"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
              <criterion comment="libvirt-admin is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268055"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
              <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268057"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
              <criterion comment="libvirt-client is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268059"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
              <criterion comment="libvirt-daemon is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268061"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
              <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268063"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
              <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268065"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
              <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268067"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
              <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268069"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
              <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268071"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
              <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268073"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
              <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268075"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
              <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268077"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
              <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268079"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
              <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268081"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
              <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268083"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
              <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268085"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
              <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268087"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
              <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268089"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
              <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268091"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
              <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268093"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
              <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268095"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
              <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268097"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
              <criterion comment="libvirt-dbus is earlier than 0:1.2.0-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175099"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
              <criterion comment="libvirt-devel is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268101"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
              <criterion comment="libvirt-docs is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268103"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
              <criterion comment="libvirt-libs is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268105"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
              <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268107"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
              <criterion comment="libvirt-nss is earlier than 0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8" test_ref="oval:org.almalinux.alsa:tst:20191268109"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="lua-guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175112"/>
              <criterion comment="lua-guestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175111"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
              <criterion comment="nbdkit is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175113"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
              <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175115"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
              <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175117"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
              <criterion comment="nbdkit-devel is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175119"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
              <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175121"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-gzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175124"/>
              <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175123"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175126"/>
              <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175125"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175128"/>
              <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175127"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-vddk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175130"/>
              <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175129"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-xz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175132"/>
              <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175131"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
              <criterion comment="netcf is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175133"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
              <criterion comment="netcf-devel is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175135"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
              <criterion comment="netcf-libs is earlier than 0:0.2.8-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175137"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175140"/>
              <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175139"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
              <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-4.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175141"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
              <criterion comment="perl-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175143"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
              <criterion comment="python3-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175145"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175148"/>
              <criterion comment="python3-libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175147"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
              <criterion comment="python3-libvirt is earlier than 0:4.5.0-1.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175149"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-guest-agent is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175152"/>
              <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175151"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-img is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175154"/>
              <criterion comment="qemu-img is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175153"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175156"/>
              <criterion comment="qemu-kvm is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175155"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-curl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175158"/>
              <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175157"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175160"/>
              <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175159"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175162"/>
              <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175161"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175164"/>
              <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175163"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-ssh is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175166"/>
              <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175165"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175168"/>
              <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175167"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175170"/>
              <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2" test_ref="oval:org.almalinux.alsa:tst:20191175169"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
              <criterion comment="ruby-hivex is earlier than 0:1.3.15-6.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175171"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175174"/>
              <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175173"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175176"/>
              <criterion comment="seabios is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175175"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175178"/>
              <criterion comment="seabios-bin is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175177"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seavgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175180"/>
              <criterion comment="seavgabios-bin is earlier than 0:1.11.1-3.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175179"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
              <criterion comment="sgabios is earlier than 1:0.20170427git-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175181"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
              <criterion comment="sgabios-bin is earlier than 1:0.20170427git-2.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175183"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
              <criterion comment="supermin is earlier than 0:5.1.19-8.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175185"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
              <criterion comment="supermin-devel is earlier than 0:5.1.19-8.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175187"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-dib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175190"/>
              <criterion comment="virt-dib is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175189"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-p2v-maker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175192"/>
              <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175191"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-v2v is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175194"/>
              <criterion comment="virt-v2v is earlier than 1:1.38.4-10.module+el8.0.0+3075+09be6b65" test_ref="oval:org.almalinux.alsa:tst:20191175193"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191269" version="636">
      <metadata>
        <title>ALSA-2019:1269: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1269" ref_url="https://errata.almalinux.org/8/ALSA-2019-1269.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1269" ref_url="https://access.redhat.com/errata/RHSA-2019:1269" source="RHSA"/>
        <reference ref_id="CVE-2018-18511" ref_url="https://access.redhat.com/security/cve/CVE-2018-18511" source="CVE"/>
        <reference ref_id="CVE-2019-11691" ref_url="https://access.redhat.com/security/cve/CVE-2019-11691" source="CVE"/>
        <reference ref_id="CVE-2019-11692" ref_url="https://access.redhat.com/security/cve/CVE-2019-11692" source="CVE"/>
        <reference ref_id="CVE-2019-11693" ref_url="https://access.redhat.com/security/cve/CVE-2019-11693" source="CVE"/>
        <reference ref_id="CVE-2019-11698" ref_url="https://access.redhat.com/security/cve/CVE-2019-11698" source="CVE"/>
        <reference ref_id="CVE-2019-5798" ref_url="https://access.redhat.com/security/cve/CVE-2019-5798" source="CVE"/>
        <reference ref_id="CVE-2019-7317" ref_url="https://access.redhat.com/security/cve/CVE-2019-7317" source="CVE"/>
        <reference ref_id="CVE-2019-9797" ref_url="https://access.redhat.com/security/cve/CVE-2019-9797" source="CVE"/>
        <reference ref_id="CVE-2019-9800" ref_url="https://access.redhat.com/security/cve/CVE-2019-9800" source="CVE"/>
        <reference ref_id="CVE-2019-9816" ref_url="https://access.redhat.com/security/cve/CVE-2019-9816" source="CVE"/>
        <reference ref_id="CVE-2019-9817" ref_url="https://access.redhat.com/security/cve/CVE-2019-9817" source="CVE"/>
        <reference ref_id="CVE-2019-9819" ref_url="https://access.redhat.com/security/cve/CVE-2019-9819" source="CVE"/>
        <reference ref_id="CVE-2019-9820" ref_url="https://access.redhat.com/security/cve/CVE-2019-9820" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 60.7.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800)

* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797)

* Mozilla: Type confusion with object groups and UnboxedObjects (CVE-2019-9816)

* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817)

* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819)

* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820)

* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691)

* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692)

* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693)

* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511)

* chromium-browser: Out of bounds read in Skia (CVE-2019-5798)

* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698)

* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-23"/>
          <updated date="2019-05-23"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2018-18511" impact="moderate" public="20190212">CVE-2018-18511</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11691" impact="important" public="20190522">CVE-2019-11691</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11692" impact="important" public="20190522">CVE-2019-11692</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11693" impact="important" public="20190522">CVE-2019-11693</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11698" impact="moderate" public="20190522">CVE-2019-11698</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-5798" impact="moderate" public="20190312">CVE-2019-5798</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-7317" impact="low" public="20190125">CVE-2019-7317</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-9797" impact="important" public="20190522">CVE-2019-9797</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-9800" impact="critical" public="20190522">CVE-2019-9800</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-9816" impact="important" public="20190522">CVE-2019-9816</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-9817" impact="important" public="20190522">CVE-2019-9817</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-567" href="https://access.redhat.com/security/cve/CVE-2019-9819" impact="important" public="20190522">CVE-2019-9819</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9820" impact="important" public="20190522">CVE-2019-9820</cve>
          <bugzilla href="https://bugzilla.redhat.com/1672409" id="1672409">CVE-2019-7317 libpng: use-after-free in png_image_free in png.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676997" id="1676997">CVE-2018-18511 mozilla: Cross-origin theft of images with ImageBitmapRenderingContext</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688200" id="1688200">CVE-2019-5798 chromium-browser: Out of bounds read in Skia</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712617" id="1712617">CVE-2019-11691 Mozilla: Use-after-free in XMLHttpRequest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712618" id="1712618">CVE-2019-11692 Mozilla: Use-after-free removing listeners in the event listener manager</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712619" id="1712619">CVE-2019-11693 Mozilla: Buffer overflow in WebGL bufferdata on Linux</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712621" id="1712621">CVE-2019-11698 Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712622" id="1712622">CVE-2019-9797 Mozilla: Cross-origin theft of images with createImageBitmap</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712623" id="1712623">CVE-2019-9800 Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712625" id="1712625">CVE-2019-9816 Mozilla: Type confusion with object groups and UnboxedObjects</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712626" id="1712626">CVE-2019-9817 Mozilla: Stealing of cross-domain images using canvas</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712628" id="1712628">CVE-2019-9819 Mozilla: Compartment mismatch with fetch API</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712629" id="1712629">CVE-2019-9820 Mozilla: Use-after-free of ChromeEventHandler by DocShell</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:60.7.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191269001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191279" version="635">
      <metadata>
        <title>ALSA-2019:1279: pacemaker security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1279" ref_url="https://errata.almalinux.org/8/ALSA-2019-1279.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1279" ref_url="https://access.redhat.com/errata/RHSA-2019:1279" source="RHSA"/>
        <reference ref_id="CVE-2018-16877" ref_url="https://access.redhat.com/security/cve/CVE-2018-16877" source="CVE"/>
        <reference ref_id="CVE-2018-16878" ref_url="https://access.redhat.com/security/cve/CVE-2018-16878" source="CVE"/>
        <reference ref_id="CVE-2019-3885" ref_url="https://access.redhat.com/security/cve/CVE-2019-3885" source="CVE"/>
        <description>The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. 

Security Fix(es):

* pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc (CVE-2018-16877)

* pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS (CVE-2018-16878)

* pacemaker: Information disclosure through use-after-free (CVE-2019-3885)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Interrupted live migration will get full start rather than completed migration (BZ#1695247)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-05-27"/>
          <updated date="2019-05-27"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2018-16877" impact="important" public="20190417:0430">CVE-2018-16877</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-16878" impact="moderate" public="20190417:0430">CVE-2018-16878</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-3885" impact="low" public="20190417:0945">CVE-2019-3885</cve>
          <bugzilla href="https://bugzilla.redhat.com/1652646" id="1652646">CVE-2018-16877 pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1657962" id="1657962">CVE-2018-16878 pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1694554" id="1694554">CVE-2019-3885 pacemaker: Information disclosure through use-after-free</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::resilientstorage</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pacemaker is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279001"/>
              <criterion comment="pacemaker is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cli is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279003"/>
              <criterion comment="pacemaker-cli is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cluster-libs is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279005"/>
              <criterion comment="pacemaker-cluster-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cts is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279007"/>
              <criterion comment="pacemaker-cts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-doc is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279009"/>
              <criterion comment="pacemaker-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-libs is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279011"/>
              <criterion comment="pacemaker-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-libs-devel is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279013"/>
              <criterion comment="pacemaker-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-nagios-plugins-metadata is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279015"/>
              <criterion comment="pacemaker-nagios-plugins-metadata is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-remote is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279017"/>
              <criterion comment="pacemaker-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-schemas is earlier than 0:2.0.1-4.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20191279019"/>
              <criterion comment="pacemaker-schemas is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191308" version="636">
      <metadata>
        <title>ALSA-2019:1308: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1308" ref_url="https://errata.almalinux.org/8/ALSA-2019-1308.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1308" ref_url="https://access.redhat.com/errata/RHSA-2019:1308" source="RHSA"/>
        <reference ref_id="CVE-2018-18511" ref_url="https://access.redhat.com/security/cve/CVE-2018-18511" source="CVE"/>
        <reference ref_id="CVE-2019-11691" ref_url="https://access.redhat.com/security/cve/CVE-2019-11691" source="CVE"/>
        <reference ref_id="CVE-2019-11692" ref_url="https://access.redhat.com/security/cve/CVE-2019-11692" source="CVE"/>
        <reference ref_id="CVE-2019-11693" ref_url="https://access.redhat.com/security/cve/CVE-2019-11693" source="CVE"/>
        <reference ref_id="CVE-2019-11698" ref_url="https://access.redhat.com/security/cve/CVE-2019-11698" source="CVE"/>
        <reference ref_id="CVE-2019-5798" ref_url="https://access.redhat.com/security/cve/CVE-2019-5798" source="CVE"/>
        <reference ref_id="CVE-2019-7317" ref_url="https://access.redhat.com/security/cve/CVE-2019-7317" source="CVE"/>
        <reference ref_id="CVE-2019-9797" ref_url="https://access.redhat.com/security/cve/CVE-2019-9797" source="CVE"/>
        <reference ref_id="CVE-2019-9800" ref_url="https://access.redhat.com/security/cve/CVE-2019-9800" source="CVE"/>
        <reference ref_id="CVE-2019-9817" ref_url="https://access.redhat.com/security/cve/CVE-2019-9817" source="CVE"/>
        <reference ref_id="CVE-2019-9819" ref_url="https://access.redhat.com/security/cve/CVE-2019-9819" source="CVE"/>
        <reference ref_id="CVE-2019-9820" ref_url="https://access.redhat.com/security/cve/CVE-2019-9820" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.7.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800)

* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797)

* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817)

* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819)

* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820)

* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691)

* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692)

* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693)

* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511)

* chromium-browser: Out of bounds read in Skia (CVE-2019-5798)

* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698)

* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-03"/>
          <updated date="2019-06-03"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2018-18511" impact="moderate" public="20190212">CVE-2018-18511</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11691" impact="important" public="20190522">CVE-2019-11691</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11692" impact="important" public="20190522">CVE-2019-11692</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11693" impact="important" public="20190522">CVE-2019-11693</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11698" impact="moderate" public="20190522">CVE-2019-11698</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-5798" impact="moderate" public="20190312">CVE-2019-5798</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-7317" impact="low" public="20190125">CVE-2019-7317</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-9797" impact="important" public="20190522">CVE-2019-9797</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-9800" impact="important" public="20190522">CVE-2019-9800</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-9817" impact="important" public="20190522">CVE-2019-9817</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-567" href="https://access.redhat.com/security/cve/CVE-2019-9819" impact="important" public="20190522">CVE-2019-9819</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9820" impact="important" public="20190522">CVE-2019-9820</cve>
          <bugzilla href="https://bugzilla.redhat.com/1672409" id="1672409">CVE-2019-7317 libpng: use-after-free in png_image_free in png.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676997" id="1676997">CVE-2018-18511 mozilla: Cross-origin theft of images with ImageBitmapRenderingContext</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688200" id="1688200">CVE-2019-5798 chromium-browser: Out of bounds read in Skia</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712617" id="1712617">CVE-2019-11691 Mozilla: Use-after-free in XMLHttpRequest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712618" id="1712618">CVE-2019-11692 Mozilla: Use-after-free removing listeners in the event listener manager</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712619" id="1712619">CVE-2019-11693 Mozilla: Buffer overflow in WebGL bufferdata on Linux</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712621" id="1712621">CVE-2019-11698 Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712622" id="1712622">CVE-2019-9797 Mozilla: Cross-origin theft of images with createImageBitmap</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712623" id="1712623">CVE-2019-9800 Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712626" id="1712626">CVE-2019-9817 Mozilla: Stealing of cross-domain images using canvas</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712628" id="1712628">CVE-2019-9819 Mozilla: Compartment mismatch with fetch API</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712629" id="1712629">CVE-2019-9820 Mozilla: Use-after-free of ChromeEventHandler by DocShell</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:60.7.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191308001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191479" version="640">
      <metadata>
        <title>ALSA-2019:1479: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1479" ref_url="https://errata.almalinux.org/8/ALSA-2019-1479.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1479" ref_url="https://access.redhat.com/errata/RHSA-2019:1479" source="RHSA"/>
        <reference ref_id="CVE-2019-11477" ref_url="https://access.redhat.com/security/cve/CVE-2019-11477" source="CVE"/>
        <reference ref_id="CVE-2019-11478" ref_url="https://access.redhat.com/security/cve/CVE-2019-11478" source="CVE"/>
        <reference ref_id="CVE-2019-11479" ref_url="https://access.redhat.com/security/cve/CVE-2019-11479" source="CVE"/>
        <reference ref_id="CVE-2019-9213" ref_url="https://access.redhat.com/security/cve/CVE-2019-9213" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)

* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)

* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)

* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [HPE 8.0 Bug] nvme drive power button does not turn off drive (BZ#1700288)

* RHEL8.0 - hw csum failure seen in dmesg and console (using mlx5/mlx4/Mellanox) (BZ#1700289)

* RHEL8.0 - vfio-ap: add subsystem to matrix device to avoid libudev failures (kvm) (BZ#1700290)

* [FJ8.1 Bug]: Make Fujitsu Erratum 010001 patch work on A64FX v1r0 (BZ#1700901)

* [FJ8.0 Bug]: Fujitsu A64FX processor errata - panic by unknown fault (BZ#1700902)

* RHEL 8.0 Snapshot 4 - nvme create-ns command hangs after creating 20 namespaces on Bolt (NVMe) (BZ#1701140)

* [Cavium/Marvell 8.0 qed] Fix qed_mcp_halt() and qed_mcp_resume() (backporting bug) (BZ#1704184)

* [Intel 8.1 Bug] PBF: Base frequency display fix (BZ#1706739)

* [RHEL8]read/write operation not permitted to /sys/kernel/debug/gcov/reset (BZ#1708100)

* RHEL8.0 - ISST-LTE:pVM:fleetwood:LPM:raylp85:After lpm seeing the  console logs on the the lpar at  target side (BZ#1708102)

* RHEL8.0 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1708112)

* [Regression] RHEL8.0 - System crashed with one stress-ng-mremap stressor on Boston (kvm host) (BZ#1708617)

* [intel ice Rhel 8 RC1] ethtool -A ethx causes interfaces to go down (BZ#1709433)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-17"/>
          <updated date="2019-06-17"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11477" impact="important" public="20190617:1700">CVE-2019-11477</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11478" impact="moderate" public="20190617:1700">CVE-2019-11478</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11479" impact="moderate" public="20190617:1700">CVE-2019-11479</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-9213" impact="important" public="20190227">CVE-2019-9213</cve>
          <bugzilla href="https://bugzilla.redhat.com/1686136" id="1686136">CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719123" id="1719123">CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719128" id="1719128">CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719129" id="1719129">CVE-2019-11479 kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.4.2.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191479051"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.4.2.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191479052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.4.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191479049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191480" version="639">
      <metadata>
        <title>ALSA-2019:1480: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1480" ref_url="https://errata.almalinux.org/8/ALSA-2019-1480.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1480" ref_url="https://access.redhat.com/errata/RHSA-2019:1480" source="RHSA"/>
        <reference ref_id="CVE-2019-11477" ref_url="https://access.redhat.com/security/cve/CVE-2019-11477" source="CVE"/>
        <reference ref_id="CVE-2019-11478" ref_url="https://access.redhat.com/security/cve/CVE-2019-11478" source="CVE"/>
        <reference ref_id="CVE-2019-11479" ref_url="https://access.redhat.com/security/cve/CVE-2019-11479" source="CVE"/>
        <reference ref_id="CVE-2019-9213" ref_url="https://access.redhat.com/security/cve/CVE-2019-9213" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)

* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)

* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)

* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-17"/>
          <updated date="2019-06-17"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11477" impact="important" public="20190617:1700">CVE-2019-11477</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11478" impact="moderate" public="20190617:1700">CVE-2019-11478</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-11479" impact="moderate" public="20190617:1700">CVE-2019-11479</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-9213" impact="important" public="20190227">CVE-2019-9213</cve>
          <bugzilla href="https://bugzilla.redhat.com/1686136" id="1686136">CVE-2019-9213 kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719123" id="1719123">CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719128" id="1719128">CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719129" id="1719129">CVE-2019-11479 kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.4.2.rt9.152.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191479051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.4.2.rt9.152.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191480026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.4.2.rt9.152.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191480023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191517" version="635">
      <metadata>
        <title>ALSA-2019:1517: gvfs security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1517" ref_url="https://errata.almalinux.org/8/ALSA-2019-1517.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1517" ref_url="https://access.redhat.com/errata/RHSA-2019:1517" source="RHSA"/>
        <reference ref_id="CVE-2019-3827" ref_url="https://access.redhat.com/security/cve/CVE-2019-3827" source="CVE"/>
        <description>GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.

Security Fix(es):

* gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-18"/>
          <updated date="2019-06-18"/>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2019-3827" impact="moderate" public="20181227">CVE-2019-3827</cve>
          <bugzilla href="https://bugzilla.redhat.com/1665578" id="1665578">CVE-2019-3827 gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gvfs is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517001"/>
              <criterion comment="gvfs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afc is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517003"/>
              <criterion comment="gvfs-afc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afp is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517005"/>
              <criterion comment="gvfs-afp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-archive is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517007"/>
              <criterion comment="gvfs-archive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-client is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517009"/>
              <criterion comment="gvfs-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-devel is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517011"/>
              <criterion comment="gvfs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-fuse is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517013"/>
              <criterion comment="gvfs-fuse is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-goa is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517015"/>
              <criterion comment="gvfs-goa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-gphoto2 is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517017"/>
              <criterion comment="gvfs-gphoto2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-mtp is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517019"/>
              <criterion comment="gvfs-mtp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-smb is earlier than 0:1.36.2-2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191517021"/>
              <criterion comment="gvfs-smb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191518" version="636">
      <metadata>
        <title>ALSA-2019:1518: java-11-openjdk security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1518" ref_url="https://errata.almalinux.org/8/ALSA-2019-1518.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1518" ref_url="https://access.redhat.com/errata/RHSA-2019:1518" source="RHSA"/>
        <reference ref_id="CVE-2019-2602" ref_url="https://access.redhat.com/security/cve/CVE-2019-2602" source="CVE"/>
        <reference ref_id="CVE-2019-2684" ref_url="https://access.redhat.com/security/cve/CVE-2019-2684" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)

* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-18"/>
          <updated date="2019-06-18"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2602" impact="moderate" public="20190416">CVE-2019-2602</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2684" impact="moderate" public="20190416">CVE-2019-2684</cve>
          <bugzilla href="https://bugzilla.redhat.com/1700440" id="1700440">CVE-2019-2602 OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700564" id="1700564">CVE-2019-2684 OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.3.7-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191518015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191519" version="637">
      <metadata>
        <title>ALSA-2019:1519: go-toolset:rhel8 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1519" ref_url="https://errata.almalinux.org/8/ALSA-2019-1519.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1519" ref_url="https://access.redhat.com/errata/RHSA-2019:1519" source="RHSA"/>
        <reference ref_id="CVE-2019-9741" ref_url="https://access.redhat.com/security/cve/CVE-2019-9741" source="CVE"/>
        <description>The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite.

Security Fix(es):

* golang: CRLF injection in net/http (CVE-2019-9741)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-18"/>
          <updated date="2019-06-18"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-9741" impact="moderate" public="20190313">CVE-2019-9741</cve>
          <bugzilla href="https://bugzilla.redhat.com/1688230" id="1688230">CVE-2019-9741 golang: CRLF injection in net/http</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="go-toolset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519002"/>
              <criterion comment="go-toolset is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519004"/>
              <criterion comment="golang is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519006"/>
              <criterion comment="golang-bin is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519008"/>
              <criterion comment="golang-docs is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519010"/>
              <criterion comment="golang-misc is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519012"/>
              <criterion comment="golang-race is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519014"/>
              <criterion comment="golang-src is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519016"/>
              <criterion comment="golang-tests is earlier than 0:1.11.5-2.module+el8.0.0+3175+261ae921" test_ref="oval:org.almalinux.alsa:tst:20191519015"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191527" version="635">
      <metadata>
        <title>ALSA-2019:1527: WALinuxAgent security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1527" ref_url="https://errata.almalinux.org/8/ALSA-2019-1527.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1527" ref_url="https://access.redhat.com/errata/RHSA-2019:1527" source="RHSA"/>
        <reference ref_id="CVE-2019-0804" ref_url="https://access.redhat.com/security/cve/CVE-2019-0804" source="CVE"/>
        <description>The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud.

Security Fix(es):

* WALinuxAgent: swapfile created with weak permissions (CVE-2019-0804)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-18"/>
          <updated date="2019-06-18"/>
          <cve cvss3="5.0/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2019-0804" impact="moderate" public="20190312">CVE-2019-0804</cve>
          <bugzilla href="https://bugzilla.redhat.com/1684181" id="1684181">CVE-2019-0804 WALinuxAgent: swapfile created with weak permissions</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="WALinuxAgent is earlier than 0:2.2.32-1.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191527001"/>
          <criterion comment="WALinuxAgent is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191527002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191529" version="635">
      <metadata>
        <title>ALSA-2019:1529: pki-deps:10.6 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1529" ref_url="https://errata.almalinux.org/8/ALSA-2019-1529.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1529" ref_url="https://access.redhat.com/errata/RHSA-2019:1529" source="RHSA"/>
        <reference ref_id="CVE-2018-11784" ref_url="https://access.redhat.com/security/cve/CVE-2018-11784" source="CVE"/>
        <reference ref_id="CVE-2018-8014" ref_url="https://access.redhat.com/security/cve/CVE-2018-8014" source="CVE"/>
        <reference ref_id="CVE-2018-8034" ref_url="https://access.redhat.com/security/cve/CVE-2018-8034" source="CVE"/>
        <reference ref_id="CVE-2018-8037" ref_url="https://access.redhat.com/security/cve/CVE-2018-8037" source="CVE"/>
        <description>The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by AlmaLinux Certificate System.

Security Fix(es):

* tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037)

* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014)

* tomcat: Open redirect in default servlet (CVE-2018-11784)

* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-18"/>
          <updated date="2019-06-18"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-99" href="https://access.redhat.com/security/cve/CVE-2018-11784" impact="moderate" public="20181003">CVE-2018-11784</cve>
          <cve cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2018-8014" impact="moderate" public="20180517">CVE-2018-8014</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-8034" impact="low" public="20180722">CVE-2018-8034</cve>
          <cve cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2018-8037" impact="important" public="20180722">CVE-2018-8037</cve>
          <bugzilla href="https://bugzilla.redhat.com/1579611" id="1579611">CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1607580" id="1607580">CVE-2018-8034 tomcat: Host name verification missing in WebSocket client</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1607582" id="1607582">CVE-2018-8037 tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1636512" id="1636512">CVE-2018-11784 tomcat: Open redirect in default servlet</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module pki-deps:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416067"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290011"/>
              <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290012"/>
              <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290031"/>
              <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290032"/>
              <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290051"/>
              <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290052"/>
              <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290071"/>
              <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290072"/>
              <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290091"/>
              <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290092"/>
              <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290111"/>
              <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290112"/>
              <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290131"/>
              <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290132"/>
              <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290151"/>
              <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290152"/>
              <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-annotations is earlier than 0:2.9.8-1.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290171"/>
              <criterion comment="jackson-annotations is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-core is earlier than 0:2.9.8-1.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290191"/>
              <criterion comment="jackson-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160202"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-databind is earlier than 0:2.9.8-1.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290211"/>
              <criterion comment="jackson-databind is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.8-1.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290231"/>
              <criterion comment="jackson-jaxrs-json-provider is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160242"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.8-1.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290251"/>
              <criterion comment="jackson-jaxrs-providers is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160262"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290271"/>
              <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290272"/>
              <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290291"/>
              <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290292"/>
              <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290311"/>
              <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290312"/>
              <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290331"/>
              <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290332"/>
              <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.7-14.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290351"/>
              <criterion comment="pki-servlet-4.0-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160362"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-servlet-container is earlier than 1:9.0.7-14.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201915290371"/>
              <criterion comment="pki-servlet-container is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915290382"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alsa:tst:201915290391"/>
              <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alsa:tst:201915290392"/>
              <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alsa:tst:201915290411"/>
              <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alsa:tst:201915290412"/>
              <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290431"/>
              <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290432"/>
              <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alsa:tst:201915290451"/>
              <criterion comment="resteasy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416046"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+454+67dccca4" test_ref="oval:org.almalinux.alsa:tst:201915290452"/>
              <criterion comment="resteasy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160462"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290471"/>
              <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290472"/>
              <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290491"/>
              <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290492"/>
              <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290511"/>
              <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290512"/>
              <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290531"/>
              <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290532"/>
              <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290551"/>
              <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290552"/>
              <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290571"/>
              <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290572"/>
              <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290591"/>
              <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290592"/>
              <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290611"/>
              <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290612"/>
              <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290631"/>
              <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290632"/>
              <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201915290651"/>
              <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201915290652"/>
              <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191580" version="636">
      <metadata>
        <title>ALSA-2019:1580: virt:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1580" ref_url="https://errata.almalinux.org/8/ALSA-2019-1580.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1580" ref_url="https://access.redhat.com/errata/RHSA-2019:1580" source="RHSA"/>
        <reference ref_id="CVE-2019-10161" ref_url="https://access.redhat.com/security/cve/CVE-2019-10161" source="CVE"/>
        <reference ref_id="CVE-2019-10166" ref_url="https://access.redhat.com/security/cve/CVE-2019-10166" source="CVE"/>
        <reference ref_id="CVE-2019-10167" ref_url="https://access.redhat.com/security/cve/CVE-2019-10167" source="CVE"/>
        <reference ref_id="CVE-2019-10168" ref_url="https://access.redhat.com/security/cve/CVE-2019-10168" source="CVE"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

Security Fix(es):

* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161)

* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166)

* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167)

* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-20"/>
          <updated date="2019-06-20"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-10161" impact="important" public="20190620:1200">CVE-2019-10161</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-10166" impact="important" public="20190620:1200">CVE-2019-10166</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="(CWE-284|CWE-250)" href="https://access.redhat.com/security/cve/CVE-2019-10167" impact="important" public="20190620:1200">CVE-2019-10167</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="(CWE-284|CWE-250)" href="https://access.redhat.com/security/cve/CVE-2019-10168" impact="important" public="20190620:1200">CVE-2019-10168</cve>
          <bugzilla href="https://bugzilla.redhat.com/1720114" id="1720114">CVE-2019-10166 libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720115" id="1720115">CVE-2019-10161 libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720117" id="1720117">CVE-2019-10167 libvirt: arbitrary command execution via virConnectGetDomainCapabilities API</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720118" id="1720118">CVE-2019-10168 libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="SLOF is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175002"/>
              <criterion comment="SLOF is earlier than 0:20171214-5.gitfa98132.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
              <criterion comment="hivex is earlier than 0:1.3.15-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
              <criterion comment="hivex-devel is earlier than 0:1.3.15-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175008"/>
              <criterion comment="libguestfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175010"/>
              <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-benchmarking is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175012"/>
              <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175014"/>
              <criterion comment="libguestfs-devel is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gfs2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175016"/>
              <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175018"/>
              <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-gobject-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175020"/>
              <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-inspect-icons is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175022"/>
              <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175024"/>
              <criterion comment="libguestfs-java is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-java-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175026"/>
              <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175028"/>
              <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-ja is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175030"/>
              <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-man-pages-uk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175032"/>
              <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rescue is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175034"/>
              <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-rsync is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175036"/>
              <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175038"/>
              <criterion comment="libguestfs-tools is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-tools-c is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175040"/>
              <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
              <criterion comment="libguestfs-winsupport is earlier than 0:8.0-2.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libguestfs-xfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175044"/>
              <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
              <criterion comment="libiscsi is earlier than 0:1.18.0-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
              <criterion comment="libiscsi-devel is earlier than 0:1.18.0-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
              <criterion comment="libiscsi-utils is earlier than 0:1.18.0-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580049"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libssh2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175052"/>
              <criterion comment="libssh2 is earlier than 0:1.8.0-7.module+el8.0.0.z+3418+a72cf898.1" test_ref="oval:org.almalinux.alsa:tst:20191580051"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
              <criterion comment="libvirt is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580053"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
              <criterion comment="libvirt-admin is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580055"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
              <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580057"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
              <criterion comment="libvirt-client is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580059"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
              <criterion comment="libvirt-daemon is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580061"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
              <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580063"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
              <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580065"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
              <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580067"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
              <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580069"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
              <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580071"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
              <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580073"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
              <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580075"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
              <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580077"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
              <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580079"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
              <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580081"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
              <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580083"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
              <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580085"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
              <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580087"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
              <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580089"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
              <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580091"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
              <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580093"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
              <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580095"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
              <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580097"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
              <criterion comment="libvirt-dbus is earlier than 0:1.2.0-2.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580099"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
              <criterion comment="libvirt-devel is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580101"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
              <criterion comment="libvirt-docs is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580103"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
              <criterion comment="libvirt-libs is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580105"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
              <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580107"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
              <criterion comment="libvirt-nss is earlier than 0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580109"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="lua-guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175112"/>
              <criterion comment="lua-guestfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580111"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
              <criterion comment="nbdkit is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580113"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
              <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580115"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
              <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580117"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
              <criterion comment="nbdkit-devel is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580119"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
              <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580121"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-gzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175124"/>
              <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580123"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175126"/>
              <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580125"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-python3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175128"/>
              <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580127"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-vddk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175130"/>
              <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580129"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nbdkit-plugin-xz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175132"/>
              <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580131"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
              <criterion comment="netcf is earlier than 0:0.2.8-10.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580133"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
              <criterion comment="netcf-devel is earlier than 0:0.2.8-10.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580135"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
              <criterion comment="netcf-libs is earlier than 0:0.2.8-10.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580137"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175140"/>
              <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580139"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
              <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-4.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580141"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
              <criterion comment="perl-hivex is earlier than 0:1.3.15-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580143"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
              <criterion comment="python3-hivex is earlier than 0:1.3.15-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580145"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175148"/>
              <criterion comment="python3-libguestfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580147"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
              <criterion comment="python3-libvirt is earlier than 0:4.5.0-1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580149"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-guest-agent is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175152"/>
              <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580151"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-img is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175154"/>
              <criterion comment="qemu-img is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580153"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175156"/>
              <criterion comment="qemu-kvm is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580155"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-curl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175158"/>
              <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580157"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175160"/>
              <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580159"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175162"/>
              <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580161"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175164"/>
              <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580163"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-block-ssh is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175166"/>
              <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580165"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175168"/>
              <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580167"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qemu-kvm-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175170"/>
              <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2" test_ref="oval:org.almalinux.alsa:tst:20191580169"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
              <criterion comment="ruby-hivex is earlier than 0:1.3.15-6.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580171"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175174"/>
              <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580173"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175176"/>
              <criterion comment="seabios is earlier than 0:1.11.1-3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580175"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175178"/>
              <criterion comment="seabios-bin is earlier than 0:1.11.1-3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580177"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="seavgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175180"/>
              <criterion comment="seavgabios-bin is earlier than 0:1.11.1-3.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580179"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
              <criterion comment="sgabios is earlier than 1:0.20170427git-2.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580181"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
              <criterion comment="sgabios-bin is earlier than 1:0.20170427git-2.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580183"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
              <criterion comment="supermin is earlier than 0:5.1.19-8.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580185"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
              <criterion comment="supermin-devel is earlier than 0:5.1.19-8.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580187"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-dib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175190"/>
              <criterion comment="virt-dib is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580189"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-p2v-maker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175192"/>
              <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580191"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-v2v is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175194"/>
              <criterion comment="virt-v2v is earlier than 1:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898" test_ref="oval:org.almalinux.alsa:tst:20191580193"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191619" version="636">
      <metadata>
        <title>ALSA-2019:1619: vim security update (Important)</title>
        <affected family="unix">
          <platform>Red Hat Enterprise Linux 7</platform>
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1619" ref_url="https://errata.almalinux.org/8/ALSA-2019-1619.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1619" ref_url="https://access.redhat.com/errata/RHSA-2019:1619" source="RHSA"/>
        <reference ref_id="CVE-2019-12735" ref_url="https://access.redhat.com/security/cve/CVE-2019-12735" source="CVE"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.

Security Fix(es):

* vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-27"/>
          <updated date="2019-06-27"/>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-12735" impact="important" public="20190605">CVE-2019-12735</cve>
          <bugzilla href="https://bugzilla.redhat.com/1718308" id="1718308">CVE-2019-12735 vim/neovim: ':source!' command allows arbitrary command execution via modelines</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Red Hat Enterprise Linux 7 is installed" test_ref="oval:org.almalinux.alsa:tst:20191619011"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="vim-X11 is earlier than 2:7.4.160-6.el7_6" test_ref="oval:org.almalinux.alsa:tst:20191619001"/>
              <criterion comment="vim-X11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-common is earlier than 2:7.4.160-6.el7_6" test_ref="oval:org.almalinux.alsa:tst:20191619003"/>
              <criterion comment="vim-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-enhanced is earlier than 2:7.4.160-6.el7_6" test_ref="oval:org.almalinux.alsa:tst:20191619005"/>
              <criterion comment="vim-enhanced is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-filesystem is earlier than 2:7.4.160-6.el7_6" test_ref="oval:org.almalinux.alsa:tst:20191619007"/>
              <criterion comment="vim-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-minimal is earlier than 2:7.4.160-6.el7_6" test_ref="oval:org.almalinux.alsa:tst:20191619009"/>
              <criterion comment="vim-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619010"/>
            </criteria>
          </criteria>
        </criteria>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="vim-X11 is earlier than 2:8.0.1763-11.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191619012"/>
              <criterion comment="vim-X11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-common is earlier than 2:8.0.1763-11.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191619013"/>
              <criterion comment="vim-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-enhanced is earlier than 2:8.0.1763-11.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191619014"/>
              <criterion comment="vim-enhanced is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-filesystem is earlier than 2:8.0.1763-11.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191619015"/>
              <criterion comment="vim-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-minimal is earlier than 2:8.0.1763-11.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191619016"/>
              <criterion comment="vim-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191623" version="637">
      <metadata>
        <title>ALSA-2019:1623: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1623" ref_url="https://errata.almalinux.org/8/ALSA-2019-1623.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1623" ref_url="https://access.redhat.com/errata/RHSA-2019:1623" source="RHSA"/>
        <reference ref_id="CVE-2019-11703" ref_url="https://access.redhat.com/security/cve/CVE-2019-11703" source="CVE"/>
        <reference ref_id="CVE-2019-11704" ref_url="https://access.redhat.com/security/cve/CVE-2019-11704" source="CVE"/>
        <reference ref_id="CVE-2019-11705" ref_url="https://access.redhat.com/security/cve/CVE-2019-11705" source="CVE"/>
        <reference ref_id="CVE-2019-11706" ref_url="https://access.redhat.com/security/cve/CVE-2019-11706" source="CVE"/>
        <reference ref_id="CVE-2019-11707" ref_url="https://access.redhat.com/security/cve/CVE-2019-11707" source="CVE"/>
        <reference ref_id="CVE-2019-11708" ref_url="https://access.redhat.com/security/cve/CVE-2019-11708" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.7.2.

Security Fix(es):

* Mozilla: Type confusion in Array.pop (CVE-2019-11707)

* thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705)

* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)

* thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703)

* thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704)

* thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-06-27"/>
          <updated date="2019-06-27"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11703" impact="moderate" public="20190613">CVE-2019-11703</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11704" impact="moderate" public="20190613">CVE-2019-11704</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-11705" impact="important" public="20190613">CVE-2019-11705</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-11706" impact="moderate" public="20190613">CVE-2019-11706</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-11707" impact="critical" public="20190619">CVE-2019-11707</cve>
          <cve cvss3="10.0/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-270" href="https://access.redhat.com/security/cve/CVE-2019-11708" impact="important" public="20190620">CVE-2019-11708</cve>
          <bugzilla href="https://bugzilla.redhat.com/1720001" id="1720001">CVE-2019-11703 libical: Heap buffer over read in icalparser.c parser_get_next_char</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720006" id="1720006">CVE-2019-11704 libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720008" id="1720008">CVE-2019-11705 libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720011" id="1720011">CVE-2019-11706 libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1721789" id="1721789">CVE-2019-11707 Mozilla: Type confusion in Array.pop</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1722673" id="1722673">CVE-2019-11708 Mozilla: Sandbox escape using Prompt:Open</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:60.7.2-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191623001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191696" version="637">
      <metadata>
        <title>ALSA-2019:1696: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1696" ref_url="https://errata.almalinux.org/8/ALSA-2019-1696.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1696" ref_url="https://access.redhat.com/errata/RHSA-2019:1696" source="RHSA"/>
        <reference ref_id="CVE-2019-11707" ref_url="https://access.redhat.com/security/cve/CVE-2019-11707" source="CVE"/>
        <reference ref_id="CVE-2019-11708" ref_url="https://access.redhat.com/security/cve/CVE-2019-11708" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 60.7.2 ESR.

Security Fix(es):

* Mozilla: Type confusion in Array.pop (CVE-2019-11707)

* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-08"/>
          <updated date="2019-07-08"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-11707" impact="critical" public="20190619">CVE-2019-11707</cve>
          <cve cvss3="10.0/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-270" href="https://access.redhat.com/security/cve/CVE-2019-11708" impact="important" public="20190620">CVE-2019-11708</cve>
          <bugzilla href="https://bugzilla.redhat.com/1721789" id="1721789">CVE-2019-11707 Mozilla: Type confusion in Array.pop</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1722673" id="1722673">CVE-2019-11708 Mozilla: Sandbox escape using Prompt:Open</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:60.7.2-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191696001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191714" version="635">
      <metadata>
        <title>ALSA-2019:1714: bind security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1714" ref_url="https://errata.almalinux.org/8/ALSA-2019-1714.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1714" ref_url="https://access.redhat.com/errata/RHSA-2019:1714" source="RHSA"/>
        <reference ref_id="CVE-2019-6471" ref_url="https://access.redhat.com/security/cve/CVE-2019-6471" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure (CVE-2019-6471)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-10"/>
          <updated date="2019-07-10"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-6471" impact="important" public="20190619">CVE-2019-6471</cve>
          <bugzilla href="https://bugzilla.redhat.com/1721780" id="1721780">CVE-2019-6471 bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.4-17.P2.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191714033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191764" version="636">
      <metadata>
        <title>ALSA-2019:1764: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1764" ref_url="https://errata.almalinux.org/8/ALSA-2019-1764.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1764" ref_url="https://access.redhat.com/errata/RHSA-2019:1764" source="RHSA"/>
        <reference ref_id="CVE-2019-11709" ref_url="https://access.redhat.com/security/cve/CVE-2019-11709" source="CVE"/>
        <reference ref_id="CVE-2019-11711" ref_url="https://access.redhat.com/security/cve/CVE-2019-11711" source="CVE"/>
        <reference ref_id="CVE-2019-11712" ref_url="https://access.redhat.com/security/cve/CVE-2019-11712" source="CVE"/>
        <reference ref_id="CVE-2019-11713" ref_url="https://access.redhat.com/security/cve/CVE-2019-11713" source="CVE"/>
        <reference ref_id="CVE-2019-11715" ref_url="https://access.redhat.com/security/cve/CVE-2019-11715" source="CVE"/>
        <reference ref_id="CVE-2019-11717" ref_url="https://access.redhat.com/security/cve/CVE-2019-11717" source="CVE"/>
        <reference ref_id="CVE-2019-11730" ref_url="https://access.redhat.com/security/cve/CVE-2019-11730" source="CVE"/>
        <reference ref_id="CVE-2019-9811" ref_url="https://access.redhat.com/security/cve/CVE-2019-9811" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 60.8.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709)

* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811)

* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711)

* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712)

* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713)

* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715)

* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717)

* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-11"/>
          <updated date="2019-07-11"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11709" impact="critical" public="20190710">CVE-2019-11709</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2019-11711" impact="important" public="20190710">CVE-2019-11711</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11712" impact="important" public="20190710">CVE-2019-11712</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11713" impact="important" public="20190710">CVE-2019-11713</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11715" impact="moderate" public="20190710">CVE-2019-11715</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2019-11717" impact="moderate" public="20190710">CVE-2019-11717</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11730" impact="moderate" public="20190710">CVE-2019-11730</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-807" href="https://access.redhat.com/security/cve/CVE-2019-9811" impact="important" public="20190710">CVE-2019-9811</cve>
          <bugzilla href="https://bugzilla.redhat.com/1728430" id="1728430">CVE-2019-11709 Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728431" id="1728431">CVE-2019-11711 Mozilla: Script injection within domain through inner window reuse</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728432" id="1728432">CVE-2019-11712 Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728433" id="1728433">CVE-2019-11713 Mozilla: Use-after-free with HTTP/2 cached stream</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728434" id="1728434">CVE-2019-11715 Mozilla: HTML parsing error can contribute to content XSS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728435" id="1728435">CVE-2019-11717 Mozilla: Caret character improperly escaped in origins</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728438" id="1728438">CVE-2019-11730 Mozilla: Same-origin policy treats all files in a directory as having the same-origin</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728439" id="1728439">CVE-2019-9811 Mozilla: Sandbox escape via installation of malicious language pack</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:60.8.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191764001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191771" version="636">
      <metadata>
        <title>ALSA-2019:1771: cyrus-imapd security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1771" ref_url="https://errata.almalinux.org/8/ALSA-2019-1771.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1771" ref_url="https://access.redhat.com/errata/RHSA-2019:1771" source="RHSA"/>
        <reference ref_id="CVE-2019-11356" ref_url="https://access.redhat.com/security/cve/CVE-2019-11356" source="CVE"/>
        <description>The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.

Security Fix(es):

* cyrus-imapd: buffer overflow in CalDAV request handling triggered by a long iCalendar property name (CVE-2019-11356)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-15"/>
          <updated date="2019-07-15"/>
          <cve cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-11356" impact="important" public="20190604">CVE-2019-11356</cve>
          <bugzilla href="https://bugzilla.redhat.com/1717828" id="1717828">CVE-2019-11356 cyrus-imapd: buffer overflow in CalDAV request handling triggered by a long iCalendar property name</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cyrus-imapd is earlier than 0:3.0.7-15.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191771001"/>
              <criterion comment="cyrus-imapd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-imapd-utils is earlier than 0:3.0.7-15.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191771003"/>
              <criterion comment="cyrus-imapd-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-imapd-vzic is earlier than 0:3.0.7-15.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20191771005"/>
              <criterion comment="cyrus-imapd-vzic is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191799" version="635">
      <metadata>
        <title>ALSA-2019:1799: thunderbird security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1799" ref_url="https://errata.almalinux.org/8/ALSA-2019-1799.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1799" ref_url="https://access.redhat.com/errata/RHSA-2019:1799" source="RHSA"/>
        <reference ref_id="CVE-2019-11709" ref_url="https://access.redhat.com/security/cve/CVE-2019-11709" source="CVE"/>
        <reference ref_id="CVE-2019-11711" ref_url="https://access.redhat.com/security/cve/CVE-2019-11711" source="CVE"/>
        <reference ref_id="CVE-2019-11712" ref_url="https://access.redhat.com/security/cve/CVE-2019-11712" source="CVE"/>
        <reference ref_id="CVE-2019-11713" ref_url="https://access.redhat.com/security/cve/CVE-2019-11713" source="CVE"/>
        <reference ref_id="CVE-2019-11715" ref_url="https://access.redhat.com/security/cve/CVE-2019-11715" source="CVE"/>
        <reference ref_id="CVE-2019-11717" ref_url="https://access.redhat.com/security/cve/CVE-2019-11717" source="CVE"/>
        <reference ref_id="CVE-2019-11730" ref_url="https://access.redhat.com/security/cve/CVE-2019-11730" source="CVE"/>
        <reference ref_id="CVE-2019-9811" ref_url="https://access.redhat.com/security/cve/CVE-2019-9811" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.8.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709)

* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811)

* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711)

* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712)

* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713)

* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715)

* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717)

* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Thunderbird fails to authenticate with gmail with ssl/tls and OAuth2 (BZ#1725919)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-16"/>
          <updated date="2019-07-16"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11709" impact="important" public="20190710">CVE-2019-11709</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2019-11711" impact="important" public="20190710">CVE-2019-11711</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11712" impact="important" public="20190710">CVE-2019-11712</cve>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11713" impact="important" public="20190710">CVE-2019-11713</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11715" impact="moderate" public="20190710">CVE-2019-11715</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2019-11717" impact="moderate" public="20190710">CVE-2019-11717</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11730" impact="moderate" public="20190710">CVE-2019-11730</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-807" href="https://access.redhat.com/security/cve/CVE-2019-9811" impact="important" public="20190710">CVE-2019-9811</cve>
          <bugzilla href="https://bugzilla.redhat.com/1728430" id="1728430">CVE-2019-11709 Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728431" id="1728431">CVE-2019-11711 Mozilla: Script injection within domain through inner window reuse</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728432" id="1728432">CVE-2019-11712 Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728433" id="1728433">CVE-2019-11713 Mozilla: Use-after-free with HTTP/2 cached stream</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728434" id="1728434">CVE-2019-11715 Mozilla: HTML parsing error can contribute to content XSS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728435" id="1728435">CVE-2019-11717 Mozilla: Caret character improperly escaped in origins</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728438" id="1728438">CVE-2019-11730 Mozilla: Same-origin policy treats all files in a directory as having the same-origin</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728439" id="1728439">CVE-2019-9811 Mozilla: Sandbox escape via installation of malicious language pack</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:60.8.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191799001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191816" version="637">
      <metadata>
        <title>ALSA-2019:1816: java-1.8.0-openjdk security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1816" ref_url="https://errata.almalinux.org/8/ALSA-2019-1816.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1816" ref_url="https://access.redhat.com/errata/RHSA-2019:1816" source="RHSA"/>
        <reference ref_id="CVE-2019-2745" ref_url="https://access.redhat.com/security/cve/CVE-2019-2745" source="CVE"/>
        <reference ref_id="CVE-2019-2762" ref_url="https://access.redhat.com/security/cve/CVE-2019-2762" source="CVE"/>
        <reference ref_id="CVE-2019-2769" ref_url="https://access.redhat.com/security/cve/CVE-2019-2769" source="CVE"/>
        <reference ref_id="CVE-2019-2786" ref_url="https://access.redhat.com/security/cve/CVE-2019-2786" source="CVE"/>
        <reference ref_id="CVE-2019-2816" ref_url="https://access.redhat.com/security/cve/CVE-2019-2816" source="CVE"/>
        <reference ref_id="CVE-2019-2842" ref_url="https://access.redhat.com/security/cve/CVE-2019-2842" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745)

* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)

* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)

* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)

* OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842)

* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-22"/>
          <updated date="2019-07-22"/>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-2745" impact="moderate" public="20190716">CVE-2019-2745</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2762" impact="moderate" public="20190716">CVE-2019-2762</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2769" impact="moderate" public="20190716">CVE-2019-2769</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2786" impact="low" public="20190716">CVE-2019-2786</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-2816" impact="moderate" public="20190716">CVE-2019-2816</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-2842" impact="moderate" public="20190716">CVE-2019-2842</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730056" id="1730056">CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730099" id="1730099">CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730110" id="1730110">CVE-2019-2842 OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730255" id="1730255">CVE-2019-2786 OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730411" id="1730411">CVE-2019-2745 OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730415" id="1730415">CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.222.b10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191816015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191817" version="637">
      <metadata>
        <title>ALSA-2019:1817: java-11-openjdk security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1817" ref_url="https://errata.almalinux.org/8/ALSA-2019-1817.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1817" ref_url="https://access.redhat.com/errata/RHSA-2019:1817" source="RHSA"/>
        <reference ref_id="CVE-2019-2745" ref_url="https://access.redhat.com/security/cve/CVE-2019-2745" source="CVE"/>
        <reference ref_id="CVE-2019-2762" ref_url="https://access.redhat.com/security/cve/CVE-2019-2762" source="CVE"/>
        <reference ref_id="CVE-2019-2769" ref_url="https://access.redhat.com/security/cve/CVE-2019-2769" source="CVE"/>
        <reference ref_id="CVE-2019-2786" ref_url="https://access.redhat.com/security/cve/CVE-2019-2786" source="CVE"/>
        <reference ref_id="CVE-2019-2816" ref_url="https://access.redhat.com/security/cve/CVE-2019-2816" source="CVE"/>
        <reference ref_id="CVE-2019-2818" ref_url="https://access.redhat.com/security/cve/CVE-2019-2818" source="CVE"/>
        <reference ref_id="CVE-2019-2821" ref_url="https://access.redhat.com/security/cve/CVE-2019-2821" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745)

* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)

* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)

* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)

* OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678) (CVE-2019-2821)

* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)

* OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344) (CVE-2019-2818)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-22"/>
          <updated date="2019-07-22"/>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-2745" impact="moderate" public="20190716">CVE-2019-2745</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2762" impact="moderate" public="20190716">CVE-2019-2762</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2769" impact="moderate" public="20190716">CVE-2019-2769</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2786" impact="low" public="20190716">CVE-2019-2786</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-2816" impact="moderate" public="20190716">CVE-2019-2816</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-385" href="https://access.redhat.com/security/cve/CVE-2019-2818" impact="low" public="20190716">CVE-2019-2818</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2019-2821" impact="moderate" public="20190716">CVE-2019-2821</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730056" id="1730056">CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730078" id="1730078">CVE-2019-2818 OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730099" id="1730099">CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730251" id="1730251">CVE-2019-2821 OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730255" id="1730255">CVE-2019-2786 OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730411" id="1730411">CVE-2019-2745 OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730415" id="1730415">CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.4.11-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191817015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191951" version="638">
      <metadata>
        <title>ALSA-2019:1951: nss and nspr security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1951" ref_url="https://errata.almalinux.org/8/ALSA-2019-1951.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1951" ref_url="https://access.redhat.com/errata/RHSA-2019:1951" source="RHSA"/>
        <reference ref_id="CVE-2018-18508" ref_url="https://access.redhat.com/security/cve/CVE-2018-18508" source="CVE"/>
        <reference ref_id="CVE-2019-11719" ref_url="https://access.redhat.com/security/cve/CVE-2019-11719" source="CVE"/>
        <reference ref_id="CVE-2019-11727" ref_url="https://access.redhat.com/security/cve/CVE-2019-11727" source="CVE"/>
        <reference ref_id="CVE-2019-11729" ref_url="https://access.redhat.com/security/cve/CVE-2019-11729" source="CVE"/>
        <reference ref_id="CVE-2019-17007" ref_url="https://access.redhat.com/security/cve/CVE-2019-17007" source="CVE"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.

The following packages have been upgraded to a later upstream version: nss (3.44.0), nspr (4.21.0). (BZ#1713187, BZ#1713188)

Security Fix(es):

* nss: NULL pointer dereference in several CMS functions resulting in a denial of service (CVE-2018-18508)

* nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719)

* nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)

* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* PQG verify fails when create DSA PQG parameters because the counts aren't returned correctly. (BZ#1685325)

* zeroization of AES context missing (BZ#1719629)

* RSA Pairwise consistency test (BZ#1719630)

* FIPS updated for nss-softoken POST (BZ#1722373)

* DH/ECDH key tests missing for the PG parameters (BZ#1722374)

* NSS should implement continuous random test on it's seed data or use the kernel AF_ALG interface for random (BZ#1725059)

* support setting supported signature algorithms in strsclnt utility (BZ#1725110)

* certutil -F with no parameters is killed with segmentation fault message (BZ#1725115)

* NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU (BZ#1725116)

* NSS should use getentropy() for seeding its RNG, not /dev/urandom. Needs update to NSS 3.37 (BZ#1725117)

* Disable TLS 1.3 in FIPS mode (BZ#1725773)

* Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 (BZ#1728259)

* x25519 allowed in FIPS mode (BZ#1728260)

* post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set (BZ#1728261)

Enhancement(s):

* Move IKEv1 and IKEv2 KDF's from libreswan to nss-softkn (BZ#1719628)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-30"/>
          <updated date="2019-07-30"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-18508" impact="moderate" public="20190122">CVE-2018-18508</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11719" impact="moderate" public="20190710">CVE-2019-11719</cve>
          <cve cvss3="3.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2019-11727" impact="low" public="20190709">CVE-2019-11727</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11729" impact="moderate" public="20190710">CVE-2019-11729</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-17007" impact="moderate" public="20190321">CVE-2019-17007</cve>
          <bugzilla href="https://bugzilla.redhat.com/1671310" id="1671310">CVE-2018-18508 nss: NULL pointer dereference in several CMS functions resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1703979" id="1703979">CVE-2019-17007 nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728436" id="1728436">CVE-2019-11719 nss: Out-of-bounds read when importing curve25519 private key</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728437" id="1728437">CVE-2019-11729 nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730988" id="1730988">CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nspr is earlier than 0:4.21.0-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951001"/>
              <criterion comment="nspr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nspr-devel is earlier than 0:4.21.0-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951003"/>
              <criterion comment="nspr-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951005"/>
              <criterion comment="nss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-devel is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951007"/>
              <criterion comment="nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951009"/>
              <criterion comment="nss-softokn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-devel is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951011"/>
              <criterion comment="nss-softokn-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951013"/>
              <criterion comment="nss-softokn-freebl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl-devel is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951015"/>
              <criterion comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-sysinit is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951017"/>
              <criterion comment="nss-sysinit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-tools is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951019"/>
              <criterion comment="nss-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951021"/>
              <criterion comment="nss-util is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util-devel is earlier than 0:3.44.0-7.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191951023"/>
              <criterion comment="nss-util-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191959" version="640">
      <metadata>
        <title>ALSA-2019:1959: kernel security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1959" ref_url="https://errata.almalinux.org/8/ALSA-2019-1959.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1959" ref_url="https://access.redhat.com/errata/RHSA-2019:1959" source="RHSA"/>
        <reference ref_id="CVE-2018-20784" ref_url="https://access.redhat.com/security/cve/CVE-2018-20784" source="CVE"/>
        <reference ref_id="CVE-2019-11085" ref_url="https://access.redhat.com/security/cve/CVE-2019-11085" source="CVE"/>
        <reference ref_id="CVE-2019-11810" ref_url="https://access.redhat.com/security/cve/CVE-2019-11810" source="CVE"/>
        <reference ref_id="CVE-2019-11811" ref_url="https://access.redhat.com/security/cve/CVE-2019-11811" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)

* kernel: DMA attack using peripheral devices  (Thunderclap) (BZ#1690716)

* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)

* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)

* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [DELL 8.0 z-stream BUG] - "CPU unsupported" message with CFL-H/S 8+2  due to updated Stepping (BZ#1711048)

* RHEL8.0 Snapshot4 - [LTC Test] Guest crashes during vfio device hot-plug/un-plug operations. (kvm) (BZ#1714746)

* Using Transactional Memory (TM) in a Guest Locks-up Host Core on a Power9 System (BZ#1714751)

* VRSAVE register not properly saved and restored (BZ#1714753)

* Fix potential spectre gadget in arch/s390/kvm/interrupt.c (BZ#1714754)

* RHEL8.0 RC2 - kernel/KVM -  count cache flush Spectre v2 mitigation (required for POWER9 DD2.3) (BZ#1715018)

* iommu/amd: Set exclusion range correctly (BZ#1715336)

* RHEL8.0 - sched/fair: Do not re-read -&gt;h_load_next during hierarchical load calculation (BZ#1715337)

* cross compile builds are broken (BZ#1715339)

* Patch generated by 'make rh-test-patch' doesn't get applied during build (BZ#1715340)

* hard lockup panic in during execution of CFS bandwidth period timer (BZ#1715345)

* perf annotate -P does not give full paths (BZ#1716887)

* [Dell EMC 8.0 BUG] File system corrupting with I/O Stress on H330 PERC on AMD Systems if IOMMU passthrough is disabled (BZ#1717344)

* Fix Spectre v1 gadgets in drivers/gpu/drm/drm_bufs.c and drivers/gpu/drm/drm_ioctl.c (BZ#1717382)

* BUG: SELinux doesn't handle NFS crossmnt well (BZ#1717777)

* krb5{,i,p} doesn't work with older enctypes on aarch64 (BZ#1717800)

* [RHEL-8.0][s390x]ltp-lite mtest06 testing hits EWD due to: rcu: INFO: rcu_sched self-detected stall on CPU (BZ#1717801)

* RHEL 8 Snapshot-6: CN1200E SW iSCSI I/O performance degradation after a SCSI device/target reset rhel-8.0.0.z] (BZ#1717804)

* dm cache metadata: Fix loading discard bitset (BZ#1717868)

* jit'd java code on power9 ppc64le experiences stack corruption (BZ#1717869)

* BUG: connect(AF_UNSPEC, ...) on a connected socket returns an error (BZ#1717870)

* mm: BUG: unable to handle kernel paging request at 0000000057ac6e9d (BZ#1718237)

* [HPE 8.0 BUG] DCPMM fsdax boot initialization takes a long time causing auto-mount to fail (BZ#1719635)

* AMD Rome: WARNING: CPU: 1 PID: 0 at arch/x86/kernel/cpu/mcheck/mce.c:1510 mcheck_cpu_init+0x7a/0x460 (BZ#1721233)

* [RHEL8.1] AMD Rome: EDAC amd64: Error: F0 not found, device 0x1460 (broken BIOS?) (BZ#1722365)

* AMD Rome: Intermittent NMI received for unknown reason (BZ#1722367)

* [DELL 8.0 BUG] - "CPU unsupported" message with WHL-U  due to updated Stepping (BZ#1722372)

Enhancement(s):

* RHEL 8  - AMD Rome Support (BZ#1721972)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-30"/>
          <updated date="2019-07-30"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-20784" impact="moderate" public="20181228">CVE-2018-20784</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-11085" impact="important" public="20190514">CVE-2019-11085</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-11810" impact="moderate" public="20190507">CVE-2019-11810</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11811" impact="moderate" public="20190507">CVE-2019-11811</cve>
          <bugzilla href="https://bugzilla.redhat.com/1680540" id="1680540">CVE-2018-20784 kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709164" id="1709164">CVE-2019-11810 kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709180" id="1709180">CVE-2019-11811 kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1710405" id="1710405">CVE-2019-11085 kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.7.1.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191959051"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.7.1.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191959052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.7.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191959049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191971" version="637">
      <metadata>
        <title>ALSA-2019:1971: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1971" ref_url="https://errata.almalinux.org/8/ALSA-2019-1971.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1971" ref_url="https://access.redhat.com/errata/RHSA-2019:1971" source="RHSA"/>
        <reference ref_id="CVE-2018-20784" ref_url="https://access.redhat.com/security/cve/CVE-2018-20784" source="CVE"/>
        <reference ref_id="CVE-2019-11085" ref_url="https://access.redhat.com/security/cve/CVE-2019-11085" source="CVE"/>
        <reference ref_id="CVE-2019-11810" ref_url="https://access.redhat.com/security/cve/CVE-2019-11810" source="CVE"/>
        <reference ref_id="CVE-2019-11811" ref_url="https://access.redhat.com/security/cve/CVE-2019-11811" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085)

* kernel: DMA attack using peripheral devices  (Thunderclap) (BZ#1690716)

* kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service (CVE-2018-20784)

* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810)

* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update to the RHEL8.0.z batch#2 source tree (BZ#1717516)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-30"/>
          <updated date="2019-07-30"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-20784" impact="moderate" public="20181228">CVE-2018-20784</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-11085" impact="important" public="20190514">CVE-2019-11085</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-11810" impact="moderate" public="20190507">CVE-2019-11810</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11811" impact="moderate" public="20190507">CVE-2019-11811</cve>
          <bugzilla href="https://bugzilla.redhat.com/1680540" id="1680540">CVE-2018-20784 kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709164" id="1709164">CVE-2019-11810 kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709180" id="1709180">CVE-2019-11811 kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1710405" id="1710405">CVE-2019-11085 kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.7.1.rt9.153.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20191959051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.7.1.rt9.153.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20191971026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.7.1.rt9.153.el8_0" test_ref="oval:org.almalinux.alsa:tst:20191971023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20191972" version="636">
      <metadata>
        <title>ALSA-2019:1972: ruby:2.5 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:1972" ref_url="https://errata.almalinux.org/8/ALSA-2019-1972.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:1972" ref_url="https://access.redhat.com/errata/RHSA-2019:1972" source="RHSA"/>
        <reference ref_id="CVE-2019-8324" ref_url="https://access.redhat.com/security/cve/CVE-2019-8324" source="CVE"/>
        <description>Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

Security Fix(es):

* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-07"/>
          <updated date="2019-08-07"/>
          <cve cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-8324" impact="important" public="20190305">CVE-2019-8324</cve>
          <bugzilla href="https://bugzilla.redhat.com/1692520" id="1692520">CVE-2019-8324 rubygems: Installing a malicious gem may lead to arbitrary code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module ruby:2.5 is enabled" test_ref="oval:org.almalinux.alba:tst:20193384065"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ruby is earlier than 0:2.5.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720011"/>
              <criterion comment="ruby is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-devel is earlier than 0:2.5.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720031"/>
              <criterion comment="ruby-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-doc is earlier than 0:2.5.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720051"/>
              <criterion comment="ruby-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-irb is earlier than 0:2.5.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720071"/>
              <criterion comment="ruby-irb is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ruby-libs is earlier than 0:2.5.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720091"/>
              <criterion comment="ruby-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt is earlier than 0:0.3.0-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720111"/>
              <criterion comment="rubygem-abrt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384012"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt is earlier than 0:0.3.0-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720112"/>
              <criterion comment="rubygem-abrt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384012"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt-doc is earlier than 0:0.3.0-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720131"/>
              <criterion comment="rubygem-abrt-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-abrt-doc is earlier than 0:0.3.0-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720132"/>
              <criterion comment="rubygem-abrt-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bigdecimal is earlier than 0:1.3.4-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720151"/>
              <criterion comment="rubygem-bigdecimal is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson is earlier than 0:4.3.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720171"/>
              <criterion comment="rubygem-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson is earlier than 0:4.3.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720172"/>
              <criterion comment="rubygem-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson-doc is earlier than 0:4.3.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720191"/>
              <criterion comment="rubygem-bson-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384020"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bson-doc is earlier than 0:4.3.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720192"/>
              <criterion comment="rubygem-bson-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384020"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.3.0+2024+c6f6daa5" test_ref="oval:org.almalinux.alsa:tst:201919720211"/>
              <criterion comment="rubygem-bundler is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.4.0+2297+c6f6daa5" test_ref="oval:org.almalinux.alsa:tst:201919720212"/>
              <criterion comment="rubygem-bundler is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384022"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler is earlier than 0:1.16.1-3.module_el8.3.0+571+bab7c6bc" test_ref="oval:org.almalinux.alsa:tst:201919720213"/>
              <criterion comment="rubygem-bundler is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840222"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.3.0+2024+c6f6daa5" test_ref="oval:org.almalinux.alsa:tst:201919720231"/>
              <criterion comment="rubygem-bundler-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384024"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.4.0+2297+c6f6daa5" test_ref="oval:org.almalinux.alsa:tst:201919720232"/>
              <criterion comment="rubygem-bundler-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384024"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-bundler-doc is earlier than 0:1.16.1-3.module_el8.3.0+571+bab7c6bc" test_ref="oval:org.almalinux.alsa:tst:201919720233"/>
              <criterion comment="rubygem-bundler-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840242"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-did_you_mean is earlier than 0:1.2.0-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720251"/>
              <criterion comment="rubygem-did_you_mean is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840262"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-io-console is earlier than 0:0.4.6-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720271"/>
              <criterion comment="rubygem-io-console is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-json is earlier than 0:2.1.0-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720291"/>
              <criterion comment="rubygem-json is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-minitest is earlier than 0:5.10.3-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720311"/>
              <criterion comment="rubygem-minitest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840322"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo is earlier than 0:2.5.1-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720331"/>
              <criterion comment="rubygem-mongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo is earlier than 0:2.5.1-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720332"/>
              <criterion comment="rubygem-mongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo-doc is earlier than 0:2.5.1-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720351"/>
              <criterion comment="rubygem-mongo-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384036"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mongo-doc is earlier than 0:2.5.1-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720352"/>
              <criterion comment="rubygem-mongo-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384036"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2 is earlier than 0:0.4.10-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720371"/>
              <criterion comment="rubygem-mysql2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2 is earlier than 0:0.4.10-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720372"/>
              <criterion comment="rubygem-mysql2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2-doc is earlier than 0:0.4.10-4.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720391"/>
              <criterion comment="rubygem-mysql2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-mysql2-doc is earlier than 0:0.4.10-4.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720392"/>
              <criterion comment="rubygem-mysql2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-net-telnet is earlier than 0:0.1.1-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720411"/>
              <criterion comment="rubygem-net-telnet is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840422"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-openssl is earlier than 0:2.1.2-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720431"/>
              <criterion comment="rubygem-openssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840442"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg is earlier than 0:1.0.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720451"/>
              <criterion comment="rubygem-pg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg is earlier than 0:1.0.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720452"/>
              <criterion comment="rubygem-pg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg-doc is earlier than 0:1.0.0-2.module_el8.5.0+2625+ec418553" test_ref="oval:org.almalinux.alsa:tst:201919720471"/>
              <criterion comment="rubygem-pg-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384048"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-pg-doc is earlier than 0:1.0.0-2.module_el8.5.0+259+8cec6917" test_ref="oval:org.almalinux.alsa:tst:201919720472"/>
              <criterion comment="rubygem-pg-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193384048"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-power_assert is earlier than 0:1.1.1-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720491"/>
              <criterion comment="rubygem-power_assert is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840502"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-psych is earlier than 0:3.0.2-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720511"/>
              <criterion comment="rubygem-psych is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-rake is earlier than 0:12.3.0-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720531"/>
              <criterion comment="rubygem-rake is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840542"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-rdoc is earlier than 0:6.0.1-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720551"/>
              <criterion comment="rubygem-rdoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840562"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-test-unit is earlier than 0:3.2.7-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720571"/>
              <criterion comment="rubygem-test-unit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840582"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygem-xmlrpc is earlier than 0:0.3.0-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720591"/>
              <criterion comment="rubygem-xmlrpc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840602"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygems is earlier than 0:2.7.6-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720611"/>
              <criterion comment="rubygems is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rubygems-devel is earlier than 0:2.7.6-104.module_el8.0.0+179+565e49e2" test_ref="oval:org.almalinux.alsa:tst:201919720631"/>
              <criterion comment="rubygems-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201933840642"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192002" version="636">
      <metadata>
        <title>ALSA-2019:2002: redis:5 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2002" ref_url="https://errata.almalinux.org/8/ALSA-2019-2002.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2002" ref_url="https://access.redhat.com/errata/RHSA-2019:2002" source="RHSA"/>
        <reference ref_id="CVE-2019-10192" ref_url="https://access.redhat.com/security/cve/CVE-2019-10192" source="CVE"/>
        <reference ref_id="CVE-2019-10193" ref_url="https://access.redhat.com/security/cve/CVE-2019-10193" source="CVE"/>
        <description>Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)

* redis: Stack buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10193)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-07"/>
          <updated date="2019-08-07"/>
          <cve cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-10192" impact="important" public="20190619">CVE-2019-10192</cve>
          <cve cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-10193" impact="important" public="20190619">CVE-2019-10193</cve>
          <bugzilla href="https://bugzilla.redhat.com/1723918" id="1723918">CVE-2019-10192 redis: Heap buffer overflow in HyperLogLog triggered by malicious client</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1727668" id="1727668">CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malicious client</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module redis:5 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192002007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="redis is earlier than 0:5.0.3-2.module_el8.0.0+6028+39922c12" test_ref="oval:org.almalinux.alsa:tst:201920020011"/>
              <criterion comment="redis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis is earlier than 0:5.0.3-2.module_el8.4.0+2242+acb471dc" test_ref="oval:org.almalinux.alsa:tst:201920020012"/>
              <criterion comment="redis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis is earlier than 0:5.0.3-2.module_el8.2.0+318+3d7e67ea" test_ref="oval:org.almalinux.alsa:tst:201920020013"/>
              <criterion comment="redis is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201920020022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-devel is earlier than 0:5.0.3-2.module_el8.0.0+6028+39922c12" test_ref="oval:org.almalinux.alsa:tst:201920020031"/>
              <criterion comment="redis-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-devel is earlier than 0:5.0.3-2.module_el8.4.0+2242+acb471dc" test_ref="oval:org.almalinux.alsa:tst:201920020032"/>
              <criterion comment="redis-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-devel is earlier than 0:5.0.3-2.module_el8.2.0+318+3d7e67ea" test_ref="oval:org.almalinux.alsa:tst:201920020033"/>
              <criterion comment="redis-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201920020042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-doc is earlier than 0:5.0.3-2.module_el8.0.0+6028+39922c12" test_ref="oval:org.almalinux.alsa:tst:201920020051"/>
              <criterion comment="redis-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-doc is earlier than 0:5.0.3-2.module_el8.4.0+2242+acb471dc" test_ref="oval:org.almalinux.alsa:tst:201920020052"/>
              <criterion comment="redis-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192002006"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="redis-doc is earlier than 0:5.0.3-2.module_el8.2.0+318+3d7e67ea" test_ref="oval:org.almalinux.alsa:tst:201920020053"/>
              <criterion comment="redis-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201920020062"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192004" version="637">
      <metadata>
        <title>ALSA-2019:2004: icedtea-web security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2004" ref_url="https://errata.almalinux.org/8/ALSA-2019-2004.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2004" ref_url="https://access.redhat.com/errata/RHSA-2019:2004" source="RHSA"/>
        <reference ref_id="CVE-2019-10181" ref_url="https://access.redhat.com/security/cve/CVE-2019-10181" source="CVE"/>
        <reference ref_id="CVE-2019-10182" ref_url="https://access.redhat.com/security/cve/CVE-2019-10182" source="CVE"/>
        <reference ref_id="CVE-2019-10185" ref_url="https://access.redhat.com/security/cve/CVE-2019-10185" source="CVE"/>
        <description>The IcedTea-Web project provides a Java web browser plug-in and an implementation of Java Web Start, which is based on the Netx project. It also contains a configuration tool for managing deployment settings for the plug-in and Web Start implementations. IcedTea-Web now also contains PolicyEditor - a simple tool to configure Java policies.

Security Fix(es):

* icedtea-web: path traversal while processing &lt;jar/&gt; elements of JNLP files results in arbitrary file overwrite (CVE-2019-10182)

* icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite (CVE-2019-10185)

* icedtea-web: unsigned code injection in a signed JAR file (CVE-2019-10181)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-07-31"/>
          <updated date="2019-07-31"/>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-345" href="https://access.redhat.com/security/cve/CVE-2019-10181" impact="moderate" public="20190731:1342">CVE-2019-10181</cve>
          <cve cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" cwe="CWE-22-&gt;CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-10182" impact="important" public="20190731:1340">CVE-2019-10182</cve>
          <cve cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-10185" impact="important" public="20190731:1341">CVE-2019-10185</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724958" id="1724958">CVE-2019-10182 icedtea-web: path traversal while processing &lt;jar/&gt; elements of JNLP files results in arbitrary file overwrite</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724989" id="1724989">CVE-2019-10185 icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1725928" id="1725928">CVE-2019-10181 icedtea-web: unsigned code injection in a signed JAR file</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="icedtea-web is earlier than 0:1.7.1-17.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192004001"/>
              <criterion comment="icedtea-web is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192004002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="icedtea-web-javadoc is earlier than 0:1.7.1-17.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192004003"/>
              <criterion comment="icedtea-web-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192004004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192405" version="635">
      <metadata>
        <title>ALSA-2019:2405: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2405" ref_url="https://errata.almalinux.org/8/ALSA-2019-2405.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2405" ref_url="https://access.redhat.com/errata/RHSA-2019:2405" source="RHSA"/>
        <reference ref_id="CVE-2019-1125" ref_url="https://access.redhat.com/security/cve/CVE-2019-1125" source="CVE"/>
        <reference ref_id="CVE-2019-13272" ref_url="https://access.redhat.com/security/cve/CVE-2019-13272" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)

* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-07"/>
          <updated date="2019-08-07"/>
          <cve cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-385-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-1125" impact="moderate" public="20190806:1700">CVE-2019-1125</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-271" href="https://access.redhat.com/security/cve/CVE-2019-13272" impact="important" public="20190716">CVE-2019-13272</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724389" id="1724389">CVE-2019-1125 kernel: hw: Spectre SWAPGS gadget vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730895" id="1730895">CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.7.2.rt9.154.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192405025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.7.2.rt9.154.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192405026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.7.2.rt9.154.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192405023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192411" version="635">
      <metadata>
        <title>ALSA-2019:2411: kernel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2411" ref_url="https://errata.almalinux.org/8/ALSA-2019-2411.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2411" ref_url="https://access.redhat.com/errata/RHSA-2019:2411" source="RHSA"/>
        <reference ref_id="CVE-2019-1125" ref_url="https://access.redhat.com/security/cve/CVE-2019-1125" source="CVE"/>
        <reference ref_id="CVE-2019-13272" ref_url="https://access.redhat.com/security/cve/CVE-2019-13272" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)

* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-07"/>
          <updated date="2019-08-07"/>
          <cve cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-385-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-1125" impact="moderate" public="20190806:1700">CVE-2019-1125</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-271" href="https://access.redhat.com/security/cve/CVE-2019-13272" impact="important" public="20190716">CVE-2019-13272</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724389" id="1724389">CVE-2019-1125 kernel: hw: Spectre SWAPGS gadget vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730895" id="1730895">CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.7.2.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192405025"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.7.2.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192411052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.7.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192411049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192465" version="634">
      <metadata>
        <title>ALSA-2019:2465: ghostscript security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2465" ref_url="https://errata.almalinux.org/8/ALSA-2019-2465.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2465" ref_url="https://access.redhat.com/errata/RHSA-2019:2465" source="RHSA"/>
        <reference ref_id="CVE-2019-10216" ref_url="https://access.redhat.com/security/cve/CVE-2019-10216" source="CVE"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: -dSAFER escape via .buildfont1 (701394) (CVE-2019-10216)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-12"/>
          <updated date="2019-08-12"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-10216" impact="important" public="20190812:1300">CVE-2019-10216</cve>
          <bugzilla href="https://bugzilla.redhat.com/1737080" id="1737080">CVE-2019-10216 ghostscript: -dSAFER escape via .buildfont1 (701394)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ghostscript is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465001"/>
              <criterion comment="ghostscript is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-doc is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465003"/>
              <criterion comment="ghostscript-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-dvipdf is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465005"/>
              <criterion comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-fonts is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465007"/>
              <criterion comment="ghostscript-tools-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-printing is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465009"/>
              <criterion comment="ghostscript-tools-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-x11 is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465011"/>
              <criterion comment="ghostscript-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465013"/>
              <criterion comment="libgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs-devel is earlier than 0:9.25-2.el8_0.2" test_ref="oval:org.almalinux.alsa:tst:20192465015"/>
              <criterion comment="libgs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192511" version="636">
      <metadata>
        <title>ALSA-2019:2511: mysql:8.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2511" ref_url="https://errata.almalinux.org/8/ALSA-2019-2511.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2511" ref_url="https://access.redhat.com/errata/RHSA-2019:2511" source="RHSA"/>
        <reference ref_id="CVE-2019-2420" ref_url="https://access.redhat.com/security/cve/CVE-2019-2420" source="CVE"/>
        <reference ref_id="CVE-2019-2434" ref_url="https://access.redhat.com/security/cve/CVE-2019-2434" source="CVE"/>
        <reference ref_id="CVE-2019-2436" ref_url="https://access.redhat.com/security/cve/CVE-2019-2436" source="CVE"/>
        <reference ref_id="CVE-2019-2455" ref_url="https://access.redhat.com/security/cve/CVE-2019-2455" source="CVE"/>
        <reference ref_id="CVE-2019-2481" ref_url="https://access.redhat.com/security/cve/CVE-2019-2481" source="CVE"/>
        <reference ref_id="CVE-2019-2482" ref_url="https://access.redhat.com/security/cve/CVE-2019-2482" source="CVE"/>
        <reference ref_id="CVE-2019-2486" ref_url="https://access.redhat.com/security/cve/CVE-2019-2486" source="CVE"/>
        <reference ref_id="CVE-2019-2494" ref_url="https://access.redhat.com/security/cve/CVE-2019-2494" source="CVE"/>
        <reference ref_id="CVE-2019-2495" ref_url="https://access.redhat.com/security/cve/CVE-2019-2495" source="CVE"/>
        <reference ref_id="CVE-2019-2502" ref_url="https://access.redhat.com/security/cve/CVE-2019-2502" source="CVE"/>
        <reference ref_id="CVE-2019-2503" ref_url="https://access.redhat.com/security/cve/CVE-2019-2503" source="CVE"/>
        <reference ref_id="CVE-2019-2507" ref_url="https://access.redhat.com/security/cve/CVE-2019-2507" source="CVE"/>
        <reference ref_id="CVE-2019-2510" ref_url="https://access.redhat.com/security/cve/CVE-2019-2510" source="CVE"/>
        <reference ref_id="CVE-2019-2528" ref_url="https://access.redhat.com/security/cve/CVE-2019-2528" source="CVE"/>
        <reference ref_id="CVE-2019-2529" ref_url="https://access.redhat.com/security/cve/CVE-2019-2529" source="CVE"/>
        <reference ref_id="CVE-2019-2530" ref_url="https://access.redhat.com/security/cve/CVE-2019-2530" source="CVE"/>
        <reference ref_id="CVE-2019-2531" ref_url="https://access.redhat.com/security/cve/CVE-2019-2531" source="CVE"/>
        <reference ref_id="CVE-2019-2532" ref_url="https://access.redhat.com/security/cve/CVE-2019-2532" source="CVE"/>
        <reference ref_id="CVE-2019-2533" ref_url="https://access.redhat.com/security/cve/CVE-2019-2533" source="CVE"/>
        <reference ref_id="CVE-2019-2534" ref_url="https://access.redhat.com/security/cve/CVE-2019-2534" source="CVE"/>
        <reference ref_id="CVE-2019-2535" ref_url="https://access.redhat.com/security/cve/CVE-2019-2535" source="CVE"/>
        <reference ref_id="CVE-2019-2536" ref_url="https://access.redhat.com/security/cve/CVE-2019-2536" source="CVE"/>
        <reference ref_id="CVE-2019-2537" ref_url="https://access.redhat.com/security/cve/CVE-2019-2537" source="CVE"/>
        <reference ref_id="CVE-2019-2539" ref_url="https://access.redhat.com/security/cve/CVE-2019-2539" source="CVE"/>
        <reference ref_id="CVE-2019-2580" ref_url="https://access.redhat.com/security/cve/CVE-2019-2580" source="CVE"/>
        <reference ref_id="CVE-2019-2581" ref_url="https://access.redhat.com/security/cve/CVE-2019-2581" source="CVE"/>
        <reference ref_id="CVE-2019-2584" ref_url="https://access.redhat.com/security/cve/CVE-2019-2584" source="CVE"/>
        <reference ref_id="CVE-2019-2585" ref_url="https://access.redhat.com/security/cve/CVE-2019-2585" source="CVE"/>
        <reference ref_id="CVE-2019-2587" ref_url="https://access.redhat.com/security/cve/CVE-2019-2587" source="CVE"/>
        <reference ref_id="CVE-2019-2589" ref_url="https://access.redhat.com/security/cve/CVE-2019-2589" source="CVE"/>
        <reference ref_id="CVE-2019-2592" ref_url="https://access.redhat.com/security/cve/CVE-2019-2592" source="CVE"/>
        <reference ref_id="CVE-2019-2593" ref_url="https://access.redhat.com/security/cve/CVE-2019-2593" source="CVE"/>
        <reference ref_id="CVE-2019-2596" ref_url="https://access.redhat.com/security/cve/CVE-2019-2596" source="CVE"/>
        <reference ref_id="CVE-2019-2606" ref_url="https://access.redhat.com/security/cve/CVE-2019-2606" source="CVE"/>
        <reference ref_id="CVE-2019-2607" ref_url="https://access.redhat.com/security/cve/CVE-2019-2607" source="CVE"/>
        <reference ref_id="CVE-2019-2614" ref_url="https://access.redhat.com/security/cve/CVE-2019-2614" source="CVE"/>
        <reference ref_id="CVE-2019-2617" ref_url="https://access.redhat.com/security/cve/CVE-2019-2617" source="CVE"/>
        <reference ref_id="CVE-2019-2620" ref_url="https://access.redhat.com/security/cve/CVE-2019-2620" source="CVE"/>
        <reference ref_id="CVE-2019-2623" ref_url="https://access.redhat.com/security/cve/CVE-2019-2623" source="CVE"/>
        <reference ref_id="CVE-2019-2624" ref_url="https://access.redhat.com/security/cve/CVE-2019-2624" source="CVE"/>
        <reference ref_id="CVE-2019-2625" ref_url="https://access.redhat.com/security/cve/CVE-2019-2625" source="CVE"/>
        <reference ref_id="CVE-2019-2626" ref_url="https://access.redhat.com/security/cve/CVE-2019-2626" source="CVE"/>
        <reference ref_id="CVE-2019-2627" ref_url="https://access.redhat.com/security/cve/CVE-2019-2627" source="CVE"/>
        <reference ref_id="CVE-2019-2628" ref_url="https://access.redhat.com/security/cve/CVE-2019-2628" source="CVE"/>
        <reference ref_id="CVE-2019-2630" ref_url="https://access.redhat.com/security/cve/CVE-2019-2630" source="CVE"/>
        <reference ref_id="CVE-2019-2631" ref_url="https://access.redhat.com/security/cve/CVE-2019-2631" source="CVE"/>
        <reference ref_id="CVE-2019-2634" ref_url="https://access.redhat.com/security/cve/CVE-2019-2634" source="CVE"/>
        <reference ref_id="CVE-2019-2635" ref_url="https://access.redhat.com/security/cve/CVE-2019-2635" source="CVE"/>
        <reference ref_id="CVE-2019-2636" ref_url="https://access.redhat.com/security/cve/CVE-2019-2636" source="CVE"/>
        <reference ref_id="CVE-2019-2644" ref_url="https://access.redhat.com/security/cve/CVE-2019-2644" source="CVE"/>
        <reference ref_id="CVE-2019-2681" ref_url="https://access.redhat.com/security/cve/CVE-2019-2681" source="CVE"/>
        <reference ref_id="CVE-2019-2683" ref_url="https://access.redhat.com/security/cve/CVE-2019-2683" source="CVE"/>
        <reference ref_id="CVE-2019-2685" ref_url="https://access.redhat.com/security/cve/CVE-2019-2685" source="CVE"/>
        <reference ref_id="CVE-2019-2686" ref_url="https://access.redhat.com/security/cve/CVE-2019-2686" source="CVE"/>
        <reference ref_id="CVE-2019-2687" ref_url="https://access.redhat.com/security/cve/CVE-2019-2687" source="CVE"/>
        <reference ref_id="CVE-2019-2688" ref_url="https://access.redhat.com/security/cve/CVE-2019-2688" source="CVE"/>
        <reference ref_id="CVE-2019-2689" ref_url="https://access.redhat.com/security/cve/CVE-2019-2689" source="CVE"/>
        <reference ref_id="CVE-2019-2691" ref_url="https://access.redhat.com/security/cve/CVE-2019-2691" source="CVE"/>
        <reference ref_id="CVE-2019-2693" ref_url="https://access.redhat.com/security/cve/CVE-2019-2693" source="CVE"/>
        <reference ref_id="CVE-2019-2694" ref_url="https://access.redhat.com/security/cve/CVE-2019-2694" source="CVE"/>
        <reference ref_id="CVE-2019-2695" ref_url="https://access.redhat.com/security/cve/CVE-2019-2695" source="CVE"/>
        <reference ref_id="CVE-2019-2737" ref_url="https://access.redhat.com/security/cve/CVE-2019-2737" source="CVE"/>
        <reference ref_id="CVE-2019-2738" ref_url="https://access.redhat.com/security/cve/CVE-2019-2738" source="CVE"/>
        <reference ref_id="CVE-2019-2739" ref_url="https://access.redhat.com/security/cve/CVE-2019-2739" source="CVE"/>
        <reference ref_id="CVE-2019-2740" ref_url="https://access.redhat.com/security/cve/CVE-2019-2740" source="CVE"/>
        <reference ref_id="CVE-2019-2752" ref_url="https://access.redhat.com/security/cve/CVE-2019-2752" source="CVE"/>
        <reference ref_id="CVE-2019-2755" ref_url="https://access.redhat.com/security/cve/CVE-2019-2755" source="CVE"/>
        <reference ref_id="CVE-2019-2757" ref_url="https://access.redhat.com/security/cve/CVE-2019-2757" source="CVE"/>
        <reference ref_id="CVE-2019-2758" ref_url="https://access.redhat.com/security/cve/CVE-2019-2758" source="CVE"/>
        <reference ref_id="CVE-2019-2774" ref_url="https://access.redhat.com/security/cve/CVE-2019-2774" source="CVE"/>
        <reference ref_id="CVE-2019-2778" ref_url="https://access.redhat.com/security/cve/CVE-2019-2778" source="CVE"/>
        <reference ref_id="CVE-2019-2780" ref_url="https://access.redhat.com/security/cve/CVE-2019-2780" source="CVE"/>
        <reference ref_id="CVE-2019-2784" ref_url="https://access.redhat.com/security/cve/CVE-2019-2784" source="CVE"/>
        <reference ref_id="CVE-2019-2785" ref_url="https://access.redhat.com/security/cve/CVE-2019-2785" source="CVE"/>
        <reference ref_id="CVE-2019-2789" ref_url="https://access.redhat.com/security/cve/CVE-2019-2789" source="CVE"/>
        <reference ref_id="CVE-2019-2795" ref_url="https://access.redhat.com/security/cve/CVE-2019-2795" source="CVE"/>
        <reference ref_id="CVE-2019-2796" ref_url="https://access.redhat.com/security/cve/CVE-2019-2796" source="CVE"/>
        <reference ref_id="CVE-2019-2797" ref_url="https://access.redhat.com/security/cve/CVE-2019-2797" source="CVE"/>
        <reference ref_id="CVE-2019-2798" ref_url="https://access.redhat.com/security/cve/CVE-2019-2798" source="CVE"/>
        <reference ref_id="CVE-2019-2800" ref_url="https://access.redhat.com/security/cve/CVE-2019-2800" source="CVE"/>
        <reference ref_id="CVE-2019-2801" ref_url="https://access.redhat.com/security/cve/CVE-2019-2801" source="CVE"/>
        <reference ref_id="CVE-2019-2802" ref_url="https://access.redhat.com/security/cve/CVE-2019-2802" source="CVE"/>
        <reference ref_id="CVE-2019-2803" ref_url="https://access.redhat.com/security/cve/CVE-2019-2803" source="CVE"/>
        <reference ref_id="CVE-2019-2805" ref_url="https://access.redhat.com/security/cve/CVE-2019-2805" source="CVE"/>
        <reference ref_id="CVE-2019-2808" ref_url="https://access.redhat.com/security/cve/CVE-2019-2808" source="CVE"/>
        <reference ref_id="CVE-2019-2810" ref_url="https://access.redhat.com/security/cve/CVE-2019-2810" source="CVE"/>
        <reference ref_id="CVE-2019-2811" ref_url="https://access.redhat.com/security/cve/CVE-2019-2811" source="CVE"/>
        <reference ref_id="CVE-2019-2812" ref_url="https://access.redhat.com/security/cve/CVE-2019-2812" source="CVE"/>
        <reference ref_id="CVE-2019-2814" ref_url="https://access.redhat.com/security/cve/CVE-2019-2814" source="CVE"/>
        <reference ref_id="CVE-2019-2815" ref_url="https://access.redhat.com/security/cve/CVE-2019-2815" source="CVE"/>
        <reference ref_id="CVE-2019-2819" ref_url="https://access.redhat.com/security/cve/CVE-2019-2819" source="CVE"/>
        <reference ref_id="CVE-2019-2826" ref_url="https://access.redhat.com/security/cve/CVE-2019-2826" source="CVE"/>
        <reference ref_id="CVE-2019-2830" ref_url="https://access.redhat.com/security/cve/CVE-2019-2830" source="CVE"/>
        <reference ref_id="CVE-2019-2834" ref_url="https://access.redhat.com/security/cve/CVE-2019-2834" source="CVE"/>
        <reference ref_id="CVE-2019-2879" ref_url="https://access.redhat.com/security/cve/CVE-2019-2879" source="CVE"/>
        <reference ref_id="CVE-2019-2948" ref_url="https://access.redhat.com/security/cve/CVE-2019-2948" source="CVE"/>
        <reference ref_id="CVE-2019-2950" ref_url="https://access.redhat.com/security/cve/CVE-2019-2950" source="CVE"/>
        <reference ref_id="CVE-2019-2969" ref_url="https://access.redhat.com/security/cve/CVE-2019-2969" source="CVE"/>
        <reference ref_id="CVE-2019-3003" ref_url="https://access.redhat.com/security/cve/CVE-2019-3003" source="CVE"/>
        <description>MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs.

The following packages have been upgraded to a later upstream version: mysql (8.0.17).

Security Fix(es):

* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755)

* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834)

* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805)

* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592)

* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789)

* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644)

* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814)

* mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503)

* mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587)

* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752)

* mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536)

* mysql: Server: Connection unspecified vulnerability (CVE-2019-2539)

* mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631)

* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636)

* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826)

* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737)

* mysql: Server: XML unspecified vulnerability (CVE-2019-2740)

* mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780)

* mysql: Server: DML unspecified vulnerability (CVE-2019-2784)

* mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795)

* mysql: Client programs unspecified vulnerability (CVE-2019-2797)

* mysql: Server: FTS unspecified vulnerability (CVE-2019-2801)

* mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819)

* mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-15"/>
          <updated date="2019-08-15"/>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2420" impact="moderate" public="20190115">CVE-2019-2420</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2434" impact="moderate" public="20190115">CVE-2019-2434</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2436" impact="moderate" public="20190115">CVE-2019-2436</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2455" impact="moderate" public="20190115">CVE-2019-2455</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2481" impact="moderate" public="20190115">CVE-2019-2481</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2482" impact="moderate" public="20190115">CVE-2019-2482</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2486" impact="moderate" public="20190115">CVE-2019-2486</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2494" impact="moderate" public="20190115">CVE-2019-2494</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2495" impact="moderate" public="20190115">CVE-2019-2495</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2502" impact="moderate" public="20190115">CVE-2019-2502</cve>
          <cve cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2503" impact="moderate" public="20190115">CVE-2019-2503</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2507" impact="moderate" public="20190115">CVE-2019-2507</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2510" impact="moderate" public="20190115">CVE-2019-2510</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2528" impact="moderate" public="20190115">CVE-2019-2528</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2529" impact="moderate" public="20190115">CVE-2019-2529</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2530" impact="moderate" public="20190115">CVE-2019-2530</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2531" impact="moderate" public="20190115">CVE-2019-2531</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2532" impact="moderate" public="20190115">CVE-2019-2532</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2533" impact="moderate" public="20190115">CVE-2019-2533</cve>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2534" impact="moderate" public="20190115">CVE-2019-2534</cve>
          <cve cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2535" impact="moderate" public="20190115">CVE-2019-2535</cve>
          <cve cvss3="5.0/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2536" impact="moderate" public="20190115">CVE-2019-2536</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2537" impact="moderate" public="20190115">CVE-2019-2537</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2539" impact="moderate" public="20190115">CVE-2019-2539</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2580" impact="moderate" public="20190416">CVE-2019-2580</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2581" impact="moderate" public="20190416">CVE-2019-2581</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2584" impact="moderate" public="20190416">CVE-2019-2584</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2585" impact="moderate" public="20190416">CVE-2019-2585</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2587" impact="moderate" public="20190416">CVE-2019-2587</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2589" impact="moderate" public="20190416">CVE-2019-2589</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2592" impact="moderate" public="20190416">CVE-2019-2592</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2593" impact="moderate" public="20190416">CVE-2019-2593</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2596" impact="moderate" public="20190416">CVE-2019-2596</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2606" impact="moderate" public="20190416">CVE-2019-2606</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2607" impact="moderate" public="20190416">CVE-2019-2607</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2614" impact="moderate" public="20190416">CVE-2019-2614</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2617" impact="moderate" public="20190416">CVE-2019-2617</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2620" impact="moderate" public="20190416">CVE-2019-2620</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2623" impact="moderate" public="20190416">CVE-2019-2623</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2624" impact="moderate" public="20190416">CVE-2019-2624</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2625" impact="moderate" public="20190416">CVE-2019-2625</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2626" impact="moderate" public="20190416">CVE-2019-2626</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2627" impact="moderate" public="20190416">CVE-2019-2627</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2628" impact="moderate" public="20190416">CVE-2019-2628</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2630" impact="moderate" public="20190416">CVE-2019-2630</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2631" impact="moderate" public="20190416">CVE-2019-2631</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2634" impact="moderate" public="20190416">CVE-2019-2634</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2635" impact="moderate" public="20190416">CVE-2019-2635</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2636" impact="moderate" public="20190416">CVE-2019-2636</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2644" impact="moderate" public="20190416">CVE-2019-2644</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2681" impact="moderate" public="20190416">CVE-2019-2681</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2683" impact="moderate" public="20190416">CVE-2019-2683</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2685" impact="moderate" public="20190416">CVE-2019-2685</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2686" impact="moderate" public="20190416">CVE-2019-2686</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2687" impact="moderate" public="20190416">CVE-2019-2687</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2688" impact="moderate" public="20190416">CVE-2019-2688</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2689" impact="moderate" public="20190416">CVE-2019-2689</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2691" impact="moderate" public="20190416">CVE-2019-2691</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2693" impact="moderate" public="20190416">CVE-2019-2693</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2694" impact="moderate" public="20190416">CVE-2019-2694</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2695" impact="moderate" public="20190416">CVE-2019-2695</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2737" impact="moderate" public="20190716">CVE-2019-2737</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2738" impact="low" public="20190716">CVE-2019-2738</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2739" impact="moderate" public="20190716">CVE-2019-2739</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2740" impact="moderate" public="20190716">CVE-2019-2740</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2752" impact="moderate" public="20190716">CVE-2019-2752</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2755" impact="moderate" public="20190716">CVE-2019-2755</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2757" impact="moderate" public="20190716">CVE-2019-2757</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2758" impact="moderate" public="20190716">CVE-2019-2758</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2774" impact="moderate" public="20190716">CVE-2019-2774</cve>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2778" impact="moderate" public="20190716">CVE-2019-2778</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2780" impact="moderate" public="20190716">CVE-2019-2780</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2784" impact="moderate" public="20190716">CVE-2019-2784</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2785" impact="moderate" public="20190716">CVE-2019-2785</cve>
          <cve cvss3="2.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2789" impact="low" public="20190716">CVE-2019-2789</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2795" impact="moderate" public="20190716">CVE-2019-2795</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2796" impact="moderate" public="20190716">CVE-2019-2796</cve>
          <cve cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2797" impact="moderate" public="20190716">CVE-2019-2797</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2798" impact="moderate" public="20190716">CVE-2019-2798</cve>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2800" impact="important" public="20190716">CVE-2019-2800</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2801" impact="moderate" public="20190716">CVE-2019-2801</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2802" impact="moderate" public="20190716">CVE-2019-2802</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2803" impact="moderate" public="20190716">CVE-2019-2803</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2805" impact="moderate" public="20190716">CVE-2019-2805</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2808" impact="moderate" public="20190716">CVE-2019-2808</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2810" impact="moderate" public="20190716">CVE-2019-2810</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2811" impact="moderate" public="20190716">CVE-2019-2811</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2812" impact="moderate" public="20190716">CVE-2019-2812</cve>
          <cve cvss3="2.2/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2814" impact="low" public="20190716">CVE-2019-2814</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2815" impact="moderate" public="20190716">CVE-2019-2815</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2819" impact="moderate" public="20190716">CVE-2019-2819</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2826" impact="moderate" public="20190716">CVE-2019-2826</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2830" impact="moderate" public="20190716">CVE-2019-2830</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2834" impact="moderate" public="20190716">CVE-2019-2834</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2879" impact="moderate" public="20190716">CVE-2019-2879</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2948" impact="moderate" public="20191015">CVE-2019-2948</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2950" impact="moderate" public="20191015">CVE-2019-2950</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2969" impact="moderate" public="20191015">CVE-2019-2969</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-3003" impact="moderate" public="20191015">CVE-2019-3003</cve>
          <bugzilla href="https://bugzilla.redhat.com/1666738" id="1666738">CVE-2019-2420 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666740" id="1666740">CVE-2019-2434 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666741" id="1666741">CVE-2019-2436 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666742" id="1666742">CVE-2019-2455 mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666743" id="1666743">CVE-2019-2481 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666744" id="1666744">CVE-2019-2482 mysql: Server: PS unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666745" id="1666745">CVE-2019-2486 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666746" id="1666746">CVE-2019-2494 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666747" id="1666747">CVE-2019-2495 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666748" id="1666748">CVE-2019-2502 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666749" id="1666749">CVE-2019-2503 mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666750" id="1666750">CVE-2019-2507 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666751" id="1666751">CVE-2019-2510 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666753" id="1666753">CVE-2019-2528 mysql: Server: Partition unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666755" id="1666755">CVE-2019-2529 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666756" id="1666756">CVE-2019-2530 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666757" id="1666757">CVE-2019-2531 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666758" id="1666758">CVE-2019-2532 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666759" id="1666759">CVE-2019-2533 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666760" id="1666760">CVE-2019-2534 mysql: Server: Replication unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666761" id="1666761">CVE-2019-2535 mysql: Server: Options unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666762" id="1666762">CVE-2019-2536 mysql: Server: Packaging unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666763" id="1666763">CVE-2019-2537 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666764" id="1666764">CVE-2019-2539 mysql: Server: Connection unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702958" id="1702958">CVE-2019-2580 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702959" id="1702959">CVE-2019-2581 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702960" id="1702960">CVE-2019-2584 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702961" id="1702961">CVE-2019-2585 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702962" id="1702962">CVE-2019-2587 mysql: Server: Partition unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702963" id="1702963">CVE-2019-2589 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702964" id="1702964">CVE-2019-2592 mysql: Server: PS unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702965" id="1702965">CVE-2019-2593 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702966" id="1702966">CVE-2019-2596 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702967" id="1702967">CVE-2019-2606 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702968" id="1702968">CVE-2019-2607 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702969" id="1702969">CVE-2019-2614 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702970" id="1702970">CVE-2019-2617 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702971" id="1702971">CVE-2019-2620 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702972" id="1702972">CVE-2019-2623 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702973" id="1702973">CVE-2019-2624 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702974" id="1702974">CVE-2019-2625 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702975" id="1702975">CVE-2019-2626 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702976" id="1702976">CVE-2019-2627 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702977" id="1702977">CVE-2019-2628 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702978" id="1702978">CVE-2019-2630 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702979" id="1702979">CVE-2019-2631 mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702981" id="1702981">CVE-2019-2635 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702982" id="1702982">CVE-2019-2636 mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702983" id="1702983">CVE-2019-2644 mysql: Server: DDL unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702984" id="1702984">CVE-2019-2681 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702985" id="1702985">CVE-2019-2683 mysql: Server: Options unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702986" id="1702986">CVE-2019-2685 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702987" id="1702987">CVE-2019-2686 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702989" id="1702989">CVE-2019-2687 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702990" id="1702990">CVE-2019-2688 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702991" id="1702991">CVE-2019-2689 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702992" id="1702992">CVE-2019-2691 mysql: Server: Security: Roles unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702993" id="1702993">CVE-2019-2693 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702994" id="1702994">CVE-2019-2694 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702995" id="1702995">CVE-2019-2695 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702997" id="1702997">CVE-2019-2634 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1731997" id="1731997">CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1731998" id="1731998">CVE-2019-2738 mysql: Server: Compiling unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1731999" id="1731999">CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732000" id="1732000">CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732005" id="1732005">CVE-2019-2752 mysql: Server: Options unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732006" id="1732006">CVE-2019-2755 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732007" id="1732007">CVE-2019-2757 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732008" id="1732008">CVE-2019-2758 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732009" id="1732009">CVE-2019-2774 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732010" id="1732010">CVE-2019-2778 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732011" id="1732011">CVE-2019-2780 mysql: Server: Components / Services unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732012" id="1732012">CVE-2019-2784 mysql: Server: DML unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732013" id="1732013">CVE-2019-2785 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732015" id="1732015">CVE-2019-2789 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732017" id="1732017">CVE-2019-2795 mysql: Server: Charsets unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732018" id="1732018">CVE-2019-2796 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732019" id="1732019">CVE-2019-2797 mysql: Client programs unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732020" id="1732020">CVE-2019-2798 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732021" id="1732021">CVE-2019-2800 mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732022" id="1732022">CVE-2019-2801 mysql: Server: FTS unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732023" id="1732023">CVE-2019-2802 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732024" id="1732024">CVE-2019-2803 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732025" id="1732025">CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732026" id="1732026">CVE-2019-2808 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732027" id="1732027">CVE-2019-2810 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732028" id="1732028">CVE-2019-2811 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732029" id="1732029">CVE-2019-2812 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732030" id="1732030">CVE-2019-2814 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732031" id="1732031">CVE-2019-2815 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732032" id="1732032">CVE-2019-2819 mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732034" id="1732034">CVE-2019-2826 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732035" id="1732035">CVE-2019-2830 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732036" id="1732036">CVE-2019-2834 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732037" id="1732037">CVE-2019-2879 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764682" id="1764682">CVE-2019-2948 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764683" id="1764683">CVE-2019-2950 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764690" id="1764690">CVE-2019-2969 mysql: Client programs unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764697" id="1764697">CVE-2019-3003 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module mysql:8.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192511021"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mecab is earlier than 0:0.996-1.module_el8.4.0+2532+b8928c02.9" test_ref="oval:org.almalinux.alsa:tst:201925110011"/>
              <criterion comment="mecab is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab is earlier than 0:0.996-1.module_el8.5.0+33+8bc5f36a.9" test_ref="oval:org.almalinux.alsa:tst:201925110012"/>
              <criterion comment="mecab is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic is earlier than 0:2.7.0.20070801-16.module_el8.4.0+2532+b8928c02" test_ref="oval:org.almalinux.alsa:tst:201925110031"/>
              <criterion comment="mecab-ipadic is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic is earlier than 0:2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a" test_ref="oval:org.almalinux.alsa:tst:201925110032"/>
              <criterion comment="mecab-ipadic is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic-EUCJP is earlier than 0:2.7.0.20070801-16.module_el8.4.0+2532+b8928c02" test_ref="oval:org.almalinux.alsa:tst:201925110051"/>
              <criterion comment="mecab-ipadic-EUCJP is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic-EUCJP is earlier than 0:2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a" test_ref="oval:org.almalinux.alsa:tst:201925110052"/>
              <criterion comment="mecab-ipadic-EUCJP is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110071"/>
              <criterion comment="mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-common is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110091"/>
              <criterion comment="mysql-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-devel is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110111"/>
              <criterion comment="mysql-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-errmsg is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110131"/>
              <criterion comment="mysql-errmsg is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-libs is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110151"/>
              <criterion comment="mysql-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-server is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110171"/>
              <criterion comment="mysql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-test is earlier than 0:8.0.17-3.module_el8.0.0+181+899d6349" test_ref="oval:org.almalinux.alsa:tst:201925110191"/>
              <criterion comment="mysql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110202"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192512" version="636">
      <metadata>
        <title>ALSA-2019:2512: subversion:1.10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2512" ref_url="https://errata.almalinux.org/8/ALSA-2019-2512.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2512" ref_url="https://access.redhat.com/errata/RHSA-2019:2512" source="RHSA"/>
        <reference ref_id="CVE-2019-0203" ref_url="https://access.redhat.com/security/cve/CVE-2019-0203" source="CVE"/>
        <description>Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.

Security Fix(es):

* subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-15"/>
          <updated date="2019-08-15"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-0203" impact="important" public="20190731:1200">CVE-2019-0203</cve>
          <bugzilla href="https://bugzilla.redhat.com/1733073" id="1733073">CVE-2019-0203 subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module subversion:1.10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192512021"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:201925120011"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:201925120012"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:201925120013"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_dav_svn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512004"/>
              <criterion comment="mod_dav_svn is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512006"/>
              <criterion comment="subversion is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512008"/>
              <criterion comment="subversion-devel is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-gnome is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512010"/>
              <criterion comment="subversion-gnome is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-javahl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512012"/>
              <criterion comment="subversion-javahl is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512014"/>
              <criterion comment="subversion-libs is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512016"/>
              <criterion comment="subversion-perl is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512018"/>
              <criterion comment="subversion-tools is earlier than 0:1.10.2-2.module+el8.0.0+3900+919b6753" test_ref="oval:org.almalinux.alsa:tst:20192512017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:201925120191"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:201925120192"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:201925120193"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192582" version="637">
      <metadata>
        <title>ALSA-2019:2582: pango security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2582" ref_url="https://errata.almalinux.org/8/ALSA-2019-2582.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2582" ref_url="https://access.redhat.com/errata/RHSA-2019:2582" source="RHSA"/>
        <reference ref_id="CVE-2019-1010238" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010238" source="CVE"/>
        <description>Pango is a library for laying out and rendering of text, with an emphasis on internationalization. Pango forms the core of text and font handling for the GTK+ widget toolkit.

Security Fix(es):

* pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow (CVE-2019-1010238)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-08-29"/>
          <updated date="2019-08-29"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-1010238" impact="important" public="20190806">CVE-2019-1010238</cve>
          <bugzilla href="https://bugzilla.redhat.com/1737785" id="1737785">CVE-2019-1010238 pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pango is earlier than 0:1.42.4-5.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192582001"/>
              <criterion comment="pango is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192582002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pango-devel is earlier than 0:1.42.4-5.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192582003"/>
              <criterion comment="pango-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192582004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192590" version="635">
      <metadata>
        <title>ALSA-2019:2590: java-1.8.0-ibm security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2590" ref_url="https://errata.almalinux.org/8/ALSA-2019-2590.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2590" ref_url="https://access.redhat.com/errata/RHSA-2019:2590" source="RHSA"/>
        <reference ref_id="CVE-2019-11772" ref_url="https://access.redhat.com/security/cve/CVE-2019-11772" source="CVE"/>
        <reference ref_id="CVE-2019-11775" ref_url="https://access.redhat.com/security/cve/CVE-2019-11775" source="CVE"/>
        <reference ref_id="CVE-2019-2762" ref_url="https://access.redhat.com/security/cve/CVE-2019-2762" source="CVE"/>
        <reference ref_id="CVE-2019-2769" ref_url="https://access.redhat.com/security/cve/CVE-2019-2769" source="CVE"/>
        <reference ref_id="CVE-2019-2786" ref_url="https://access.redhat.com/security/cve/CVE-2019-2786" source="CVE"/>
        <reference ref_id="CVE-2019-2816" ref_url="https://access.redhat.com/security/cve/CVE-2019-2816" source="CVE"/>
        <reference ref_id="CVE-2019-7317" ref_url="https://access.redhat.com/security/cve/CVE-2019-7317" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR5-FP40.

Security Fix(es):

* IBM JDK: Out-of-bounds access in the String.getBytes method (CVE-2019-11772)

* IBM JDK: Failure to privatize a value pulled out of the loop by versioning (CVE-2019-11775)

* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762)

* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769)

* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816)

* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)

* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-02"/>
          <updated date="2019-09-02"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-11772" impact="important" public="20190801">CVE-2019-11772</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-11775" impact="important" public="20190801">CVE-2019-11775</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2762" impact="moderate" public="20190716">CVE-2019-2762</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2769" impact="moderate" public="20190716">CVE-2019-2769</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2786" impact="low" public="20190716">CVE-2019-2786</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-2816" impact="moderate" public="20190716">CVE-2019-2816</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-7317" impact="low" public="20190125">CVE-2019-7317</cve>
          <bugzilla href="https://bugzilla.redhat.com/1672409" id="1672409">CVE-2019-7317 libpng: use-after-free in png_image_free in png.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730056" id="1730056">CVE-2019-2769 OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730099" id="1730099">CVE-2019-2816 OpenJDK: Missing URL format validation (Networking, 8221518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730255" id="1730255">CVE-2019-2786 OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730415" id="1730415">CVE-2019-2762 OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1738547" id="1738547">CVE-2019-11772 IBM JDK: Out-of-bounds access in the String.getBytes method</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1738549" id="1738549">CVE-2019-11775 IBM JDK: Failure to privatize a value pulled out of the loop by versioning</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.5.40-3.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192590015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192591" version="636">
      <metadata>
        <title>ALSA-2019:2591: ghostscript security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2591" ref_url="https://errata.almalinux.org/8/ALSA-2019-2591.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2591" ref_url="https://access.redhat.com/errata/RHSA-2019:2591" source="RHSA"/>
        <reference ref_id="CVE-2019-14811" ref_url="https://access.redhat.com/security/cve/CVE-2019-14811" source="CVE"/>
        <reference ref_id="CVE-2019-14812" ref_url="https://access.redhat.com/security/cve/CVE-2019-14812" source="CVE"/>
        <reference ref_id="CVE-2019-14813" ref_url="https://access.redhat.com/security/cve/CVE-2019-14813" source="CVE"/>
        <reference ref_id="CVE-2019-14817" ref_url="https://access.redhat.com/security/cve/CVE-2019-14817" source="CVE"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) (CVE-2019-14811)

* ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) (CVE-2019-14812)

* ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) (CVE-2019-14813)

* ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (CVE-2019-14817)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-02"/>
          <updated date="2019-09-02"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-14811" impact="important" public="20190828:1200">CVE-2019-14811</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-14812" impact="important" public="20190828:1200">CVE-2019-14812</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-14813" impact="important" public="20190828:1200">CVE-2019-14813</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-14817" impact="important" public="20190828:1200">CVE-2019-14817</cve>
          <bugzilla href="https://bugzilla.redhat.com/1743737" id="1743737">CVE-2019-14813 ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743754" id="1743754">CVE-2019-14812 ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743757" id="1743757">CVE-2019-14811 ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744042" id="1744042">CVE-2019-14817 ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ghostscript is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591001"/>
              <criterion comment="ghostscript is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-doc is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591003"/>
              <criterion comment="ghostscript-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-dvipdf is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591005"/>
              <criterion comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-fonts is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591007"/>
              <criterion comment="ghostscript-tools-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-printing is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591009"/>
              <criterion comment="ghostscript-tools-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-x11 is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591011"/>
              <criterion comment="ghostscript-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591013"/>
              <criterion comment="libgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs-devel is earlier than 0:9.25-2.el8_0.3" test_ref="oval:org.almalinux.alsa:tst:20192591015"/>
              <criterion comment="libgs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192593" version="635">
      <metadata>
        <title>ALSA-2019:2593: squid:4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2593" ref_url="https://errata.almalinux.org/8/ALSA-2019-2593.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2593" ref_url="https://access.redhat.com/errata/RHSA-2019:2593" source="RHSA"/>
        <reference ref_id="CVE-2019-12527" ref_url="https://access.redhat.com/security/cve/CVE-2019-12527" source="CVE"/>
        <description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-03"/>
          <updated date="2019-09-03"/>
          <cve cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-12527" impact="important" public="20190712">CVE-2019-12527</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730533" id="1730533">CVE-2019-12527 squid: heap-based buffer overflow in HttpHeader::getAuth</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module squid:4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192593007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201925930011"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201925930012"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201925930031"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201925930032"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-5.module_el8.0.0+182+b6dc903f" test_ref="oval:org.almalinux.alsa:tst:201925930051"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192663" version="637">
      <metadata>
        <title>ALSA-2019:2663: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2663" ref_url="https://errata.almalinux.org/8/ALSA-2019-2663.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2663" ref_url="https://access.redhat.com/errata/RHSA-2019:2663" source="RHSA"/>
        <reference ref_id="CVE-2019-11733" ref_url="https://access.redhat.com/security/cve/CVE-2019-11733" source="CVE"/>
        <reference ref_id="CVE-2019-11735" ref_url="https://access.redhat.com/security/cve/CVE-2019-11735" source="CVE"/>
        <reference ref_id="CVE-2019-11738" ref_url="https://access.redhat.com/security/cve/CVE-2019-11738" source="CVE"/>
        <reference ref_id="CVE-2019-11740" ref_url="https://access.redhat.com/security/cve/CVE-2019-11740" source="CVE"/>
        <reference ref_id="CVE-2019-11742" ref_url="https://access.redhat.com/security/cve/CVE-2019-11742" source="CVE"/>
        <reference ref_id="CVE-2019-11743" ref_url="https://access.redhat.com/security/cve/CVE-2019-11743" source="CVE"/>
        <reference ref_id="CVE-2019-11744" ref_url="https://access.redhat.com/security/cve/CVE-2019-11744" source="CVE"/>
        <reference ref_id="CVE-2019-11746" ref_url="https://access.redhat.com/security/cve/CVE-2019-11746" source="CVE"/>
        <reference ref_id="CVE-2019-11747" ref_url="https://access.redhat.com/security/cve/CVE-2019-11747" source="CVE"/>
        <reference ref_id="CVE-2019-11748" ref_url="https://access.redhat.com/security/cve/CVE-2019-11748" source="CVE"/>
        <reference ref_id="CVE-2019-11749" ref_url="https://access.redhat.com/security/cve/CVE-2019-11749" source="CVE"/>
        <reference ref_id="CVE-2019-11750" ref_url="https://access.redhat.com/security/cve/CVE-2019-11750" source="CVE"/>
        <reference ref_id="CVE-2019-11752" ref_url="https://access.redhat.com/security/cve/CVE-2019-11752" source="CVE"/>
        <reference ref_id="CVE-2019-9812" ref_url="https://access.redhat.com/security/cve/CVE-2019-9812" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.1.0 ESR.

Security Fix(es):

* Mozilla: Sandbox escape through Firefox Sync (CVE-2019-9812)

* Mozilla: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1 (CVE-2019-11735)

* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740)

* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742)

* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744)

* Mozilla: Use-after-free while manipulating video (CVE-2019-11746)

* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752)

* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)

* Mozilla: Persistence of WebRTC permissions in a third party context (CVE-2019-11748)

* Mozilla: Camera information available without prompting using getUserMedia (CVE-2019-11749)

* Mozilla: Type confusion in Spidermonkey (CVE-2019-11750)

* Mozilla: Content security policy bypass through hash-based sources in directives (CVE-2019-11738)

* Mozilla: 'Forget about this site' removes sites from pre-loaded HSTS list (CVE-2019-11747)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-04"/>
          <updated date="2019-09-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-862|CWE-306)" href="https://access.redhat.com/security/cve/CVE-2019-11733" impact="moderate" public="20190814">CVE-2019-11733</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11735" impact="important" public="20190903">CVE-2019-11735</cve>
          <cve cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2019-11738" impact="low" public="20190903">CVE-2019-11738</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11740" impact="important" public="20190903">CVE-2019-11740</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11742" impact="important" public="20190903">CVE-2019-11742</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11743" impact="moderate" public="20190903">CVE-2019-11743</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11744" impact="important" public="20190903">CVE-2019-11744</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11746" impact="important" public="20190903">CVE-2019-11746</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2019-11747" impact="low" public="20190903">CVE-2019-11747</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2019-11748" impact="moderate" public="20190903">CVE-2019-11748</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11749" impact="moderate" public="20190903">CVE-2019-11749</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-11750" impact="moderate" public="20190903">CVE-2019-11750</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11752" impact="important" public="20190903">CVE-2019-11752</cve>
          <cve cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-9812" impact="important" public="20190903">CVE-2019-9812</cve>
          <bugzilla href="https://bugzilla.redhat.com/1745687" id="1745687">CVE-2019-11733 firefox: stored passwords in 'Saved Logins' can be copied without master password entry</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748652" id="1748652">CVE-2019-11740 Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748653" id="1748653">CVE-2019-11742 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748654" id="1748654">CVE-2019-11743 Mozilla: Cross-origin access to unload event attributes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748655" id="1748655">CVE-2019-11744 Mozilla: XSS by breaking out of title and textarea elements using innerHTML</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748656" id="1748656">CVE-2019-11746 Mozilla: Use-after-free while manipulating video</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748657" id="1748657">CVE-2019-11752 Mozilla: Use-after-free while extracting a key value in IndexedDB</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748660" id="1748660">CVE-2019-9812 Mozilla: Sandbox escape through Firefox Sync</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748661" id="1748661">CVE-2019-11735 Mozilla: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748663" id="1748663">CVE-2019-11738 Mozilla: Content security policy bypass through hash-based sources in directives</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748664" id="1748664">CVE-2019-11747 Mozilla: 'Forget about this site' removes sites from pre-loaded HSTS list</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748665" id="1748665">CVE-2019-11748 Mozilla: Persistence of WebRTC permissions in a third party context</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748666" id="1748666">CVE-2019-11749 Mozilla: Camera information available without prompting using getUserMedia</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748667" id="1748667">CVE-2019-11750 Mozilla: Type confusion in Spidermonkey</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.1.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192663001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192692" version="635">
      <metadata>
        <title>ALSA-2019:2692: nghttp2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2692" ref_url="https://errata.almalinux.org/8/ALSA-2019-2692.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2692" ref_url="https://access.redhat.com/errata/RHSA-2019:2692" source="RHSA"/>
        <reference ref_id="CVE-2019-9511" ref_url="https://access.redhat.com/security/cve/CVE-2019-9511" source="CVE"/>
        <reference ref_id="CVE-2019-9513" ref_url="https://access.redhat.com/security/cve/CVE-2019-9513" source="CVE"/>
        <description>libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.

Security Fix(es):

* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)

* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-09"/>
          <updated date="2019-09-09"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9511" impact="important" public="20190813">CVE-2019-9511</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9513" impact="important" public="20190813:1700">CVE-2019-9513</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735741" id="1735741">CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741860" id="1741860">CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libnghttp2 is earlier than 0:1.33.0-1.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192692001"/>
              <criterion comment="libnghttp2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libnghttp2-devel is earlier than 0:1.33.0-1.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192692003"/>
              <criterion comment="libnghttp2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nghttp2 is earlier than 0:1.33.0-1.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192692005"/>
              <criterion comment="nghttp2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192703" version="635">
      <metadata>
        <title>ALSA-2019:2703: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2703" ref_url="https://errata.almalinux.org/8/ALSA-2019-2703.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2703" ref_url="https://access.redhat.com/errata/RHSA-2019:2703" source="RHSA"/>
        <reference ref_id="CVE-2018-19824" ref_url="https://access.redhat.com/security/cve/CVE-2018-19824" source="CVE"/>
        <reference ref_id="CVE-2019-11487" ref_url="https://access.redhat.com/security/cve/CVE-2019-11487" source="CVE"/>
        <reference ref_id="CVE-2019-12817" ref_url="https://access.redhat.com/security/cve/CVE-2019-12817" source="CVE"/>
        <reference ref_id="CVE-2019-3846" ref_url="https://access.redhat.com/security/cve/CVE-2019-3846" source="CVE"/>
        <reference ref_id="CVE-2019-3887" ref_url="https://access.redhat.com/security/cve/CVE-2019-3887" source="CVE"/>
        <reference ref_id="CVE-2019-9500" ref_url="https://access.redhat.com/security/cve/CVE-2019-9500" source="CVE"/>
        <reference ref_id="CVE-2019-9503" ref_url="https://access.redhat.com/security/cve/CVE-2019-9503" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846)

* Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS (CVE-2019-3887)

* kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500)

* kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)

* kernel: ppc: unrelated processes being able to read/write to each other's virtual memory (CVE-2019-12817)

* kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() (CVE-2018-19824)

* kernel: brcmfmac frame validation bypass (CVE-2019-9503)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [DELL EMC 8.0 BUG]: pciehp deadlock resulting in NVMe device not being recognized when hot plugged (BZ#1712261)

* Host crashed while try to boot a compatible guest attached huge page by"-object memory-backend-file *"[1G-P9] (BZ#1714758)

* Setting malformed authenc key will crash the system  (BZ#1715335)

* BUG: memory allocation failure in inode_doinit_with_dentry()/context_to_sid() (BZ#1717780)

* [HPEMC 8.1 BUG] Protect against concurrent calls into UV BIOS (BZ#1724534)

* PHC jumping on I350 (igb) (BZ#1726352)

* aarch64 kernel missing vulnerabilities status files (BZ#1726353)

* BUG: KASAN: use-after-free in skb_release_data() (BZ#1726354)

* [RHEL8][PANIC][aarch64] kernel panic when loading the dme1737 module (BZ#1726355)

* [RHEL8] [aarch64] Changes for BZ1672997 break kaslr (BZ#1726357)

* Network fails to come up when booting with kernel 3.10.0-862.el7.x86_64, several hung tasks can be seen in logs. (BZ#1726358)

* [Intel] 'cpupower frequency-set' produces unexpected results for some processors (BZ#1726360)

* HDMI/DP audio: ELD not updated on hotplug event (BZ#1726361)

* [mlx5_core] CX5 Adapter works not as expected when MTU is 9000, Unable to handle kernel paging request at virtual address 3ae0aafeff4b6b5a (BZ#1726372)

* [DELL 8.0 Bug] - hid-multitouch 0018:1FD2:8008.0001 ,lost function from S3 resume  (BZ#1727098)

* [RHEL8.1 Pre Beta] [Power8] data corruption while returning from watchpoint exception handler (BZ#1733281)

* RHEL8.1 pre-Beta - cacheinfo code unsafe vs LPM (BZ#1733282)

* RHEL8.1 pre-Beta - [ZZ/Zeppelin] [kernel-4.18.0-100.el8.ppc64le] Hash MMU allows child to write parents process address space (BZ#1734689)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-19824" impact="moderate" public="20181204">CVE-2018-19824</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11487" impact="important" public="20190422">CVE-2019-11487</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119-&gt;(CWE-125|CWE-787)" href="https://access.redhat.com/security/cve/CVE-2019-12817" impact="important" public="20190624">CVE-2019-12817</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-3846" impact="important" public="20190530:1253">CVE-2019-3846</cve>
          <cve cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-3887" impact="important" public="20190405:1600">CVE-2019-3887</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9500" impact="important" public="20190219">CVE-2019-9500</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-9503" impact="moderate" public="20190219">CVE-2019-9503</cve>
          <bugzilla href="https://bugzilla.redhat.com/1655816" id="1655816">CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695044" id="1695044">CVE-2019-3887 Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701224" id="1701224">CVE-2019-9500 kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701842" id="1701842">CVE-2019-9503 kernel: brcmfmac frame validation bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1703063" id="1703063">CVE-2019-11487 kernel: Count overflow in FUSE request leading to use-after-free issues.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1713059" id="1713059">CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1720616" id="1720616">CVE-2019-12817 kernel: ppc: unrelated processes being able to read/write to each other's virtual memory</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.11.1.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192703051"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.11.1.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192703052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.11.1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192703049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192713" version="636">
      <metadata>
        <title>ALSA-2019:2713: poppler security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2713" ref_url="https://errata.almalinux.org/8/ALSA-2019-2713.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2713" ref_url="https://access.redhat.com/errata/RHSA-2019:2713" source="RHSA"/>
        <reference ref_id="CVE-2018-18897" ref_url="https://access.redhat.com/security/cve/CVE-2018-18897" source="CVE"/>
        <reference ref_id="CVE-2018-20481" ref_url="https://access.redhat.com/security/cve/CVE-2018-20481" source="CVE"/>
        <reference ref_id="CVE-2018-20551" ref_url="https://access.redhat.com/security/cve/CVE-2018-20551" source="CVE"/>
        <reference ref_id="CVE-2018-20650" ref_url="https://access.redhat.com/security/cve/CVE-2018-20650" source="CVE"/>
        <reference ref_id="CVE-2018-20662" ref_url="https://access.redhat.com/security/cve/CVE-2018-20662" source="CVE"/>
        <reference ref_id="CVE-2019-10871" ref_url="https://access.redhat.com/security/cve/CVE-2019-10871" source="CVE"/>
        <reference ref_id="CVE-2019-12293" ref_url="https://access.redhat.com/security/cve/CVE-2019-12293" source="CVE"/>
        <reference ref_id="CVE-2019-7310" ref_url="https://access.redhat.com/security/cve/CVE-2019-7310" source="CVE"/>
        <reference ref_id="CVE-2019-9200" ref_url="https://access.redhat.com/security/cve/CVE-2019-9200" source="CVE"/>
        <reference ref_id="CVE-2019-9631" ref_url="https://access.redhat.com/security/cve/CVE-2019-9631" source="CVE"/>
        <reference ref_id="CVE-2019-9903" ref_url="https://access.redhat.com/security/cve/CVE-2019-9903" source="CVE"/>
        <reference ref_id="CVE-2019-9959" ref_url="https://access.redhat.com/security/cve/CVE-2019-9959" source="CVE"/>
        <description>Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.

Security Fix(es):

* poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310)

* poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200)

* poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc (CVE-2019-10871)

* poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc (CVE-2019-12293)

* poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897)

* poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481)

* poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c (CVE-2018-20551)

* poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650)

* poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662)

* poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)

* poppler: stack consumption in function Dict::find() in Dict.cc (CVE-2019-9903)

* poppler: integer overflow in JPXStream::init function leading to memory consumption (CVE-2019-9959)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-18897" impact="low" public="20181101">CVE-2018-18897</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-20481" impact="low" public="20181220">CVE-2018-20481</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-20551" impact="low" public="20181226">CVE-2018-20551</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-20650" impact="low" public="20181228">CVE-2018-20650</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-20662" impact="low" public="20181230">CVE-2018-20662</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-10871" impact="moderate" public="20190403">CVE-2019-10871</cve>
          <cve cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-12293" impact="moderate" public="20190523">CVE-2019-12293</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7310" impact="moderate" public="20190201">CVE-2019-7310</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9200" impact="moderate" public="20190225">CVE-2019-9200</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9631" impact="low" public="20190307">CVE-2019-9631</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9903" impact="low" public="20190315">CVE-2019-9903</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-9959" impact="low" public="20190723">CVE-2019-9959</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646546" id="1646546">CVE-2018-18897 poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1665259" id="1665259">CVE-2018-20551 poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1665263" id="1665263">CVE-2018-20650 poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1665266" id="1665266">CVE-2018-20481 poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1665273" id="1665273">CVE-2018-20662 poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1672419" id="1672419">CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1683632" id="1683632">CVE-2019-9200 poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1686802" id="1686802">CVE-2019-9631 poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1691724" id="1691724">CVE-2019-9903 poppler: stack consumption in function Dict::find() in Dict.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1696636" id="1696636">CVE-2019-10871 poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1713582" id="1713582">CVE-2019-12293 poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732340" id="1732340">CVE-2019-9959 poppler: integer overflow in JPXStream::init function leading to memory consumption</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="poppler is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713001"/>
              <criterion comment="poppler is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-cpp is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713003"/>
              <criterion comment="poppler-cpp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-cpp-devel is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713005"/>
              <criterion comment="poppler-cpp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-devel is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713007"/>
              <criterion comment="poppler-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-glib is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713009"/>
              <criterion comment="poppler-glib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-glib-devel is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713011"/>
              <criterion comment="poppler-glib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-qt5 is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713013"/>
              <criterion comment="poppler-qt5 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-qt5-devel is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713015"/>
              <criterion comment="poppler-qt5-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-utils is earlier than 0:0.66.0-11.el8_0.12" test_ref="oval:org.almalinux.alsa:tst:20192713017"/>
              <criterion comment="poppler-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192720" version="636">
      <metadata>
        <title>ALSA-2019:2720: pki-deps:10.6 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2720" ref_url="https://errata.almalinux.org/8/ALSA-2019-2720.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2720" ref_url="https://access.redhat.com/errata/RHSA-2019:2720" source="RHSA"/>
        <reference ref_id="CVE-2019-12384" ref_url="https://access.redhat.com/security/cve/CVE-2019-12384" source="CVE"/>
        <description>The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by AlmaLinux Certificate System.

Security Fix(es):

* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2019-12384" impact="important" public="20190621">CVE-2019-12384</cve>
          <bugzilla href="https://bugzilla.redhat.com/1725807" id="1725807">CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module pki-deps:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416067"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200011"/>
              <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200012"/>
              <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200031"/>
              <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200032"/>
              <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200051"/>
              <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200052"/>
              <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200071"/>
              <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200072"/>
              <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200091"/>
              <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200092"/>
              <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200111"/>
              <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200112"/>
              <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200131"/>
              <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200132"/>
              <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200151"/>
              <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200152"/>
              <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-annotations is earlier than 0:2.9.9-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alsa:tst:201927200171"/>
              <criterion comment="jackson-annotations is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-core is earlier than 0:2.9.9-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alsa:tst:201927200191"/>
              <criterion comment="jackson-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160202"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-databind is earlier than 0:2.9.9.2-1.module_el8.1.0+233+b2be703e" test_ref="oval:org.almalinux.alsa:tst:201927200211"/>
              <criterion comment="jackson-databind is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200231"/>
              <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200232"/>
              <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200251"/>
              <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200252"/>
              <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200271"/>
              <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200272"/>
              <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200291"/>
              <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200292"/>
              <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200311"/>
              <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200312"/>
              <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200331"/>
              <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200332"/>
              <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.7-14.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201927200351"/>
              <criterion comment="pki-servlet-4.0-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160362"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-servlet-container is earlier than 1:9.0.7-14.module_el8.0.0+42+51564204" test_ref="oval:org.almalinux.alsa:tst:201927200371"/>
              <criterion comment="pki-servlet-container is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915290382"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alsa:tst:201927200391"/>
              <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alsa:tst:201927200392"/>
              <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alsa:tst:201927200411"/>
              <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alsa:tst:201927200412"/>
              <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200431"/>
              <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200432"/>
              <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alsa:tst:201927200451"/>
              <criterion comment="resteasy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416046"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+454+67dccca4" test_ref="oval:org.almalinux.alsa:tst:201927200452"/>
              <criterion comment="resteasy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160462"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200471"/>
              <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200472"/>
              <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200491"/>
              <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200492"/>
              <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200511"/>
              <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200512"/>
              <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200531"/>
              <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200532"/>
              <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200551"/>
              <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200552"/>
              <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200571"/>
              <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200572"/>
              <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200591"/>
              <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200592"/>
              <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200611"/>
              <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200612"/>
              <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200631"/>
              <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200632"/>
              <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:201927200651"/>
              <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:201927200652"/>
              <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192722" version="637">
      <metadata>
        <title>ALSA-2019:2722: libwmf security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2722" ref_url="https://errata.almalinux.org/8/ALSA-2019-2722.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2722" ref_url="https://access.redhat.com/errata/RHSA-2019:2722" source="RHSA"/>
        <reference ref_id="CVE-2019-6978" ref_url="https://access.redhat.com/security/cve/CVE-2019-6978" source="CVE"/>
        <description>The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick.

Security Fix(es):

* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-6978" impact="low" public="20190115">CVE-2019-6978</cve>
          <bugzilla href="https://bugzilla.redhat.com/1671390" id="1671390">CVE-2019-6978 gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libwmf is earlier than 0:0.2.9-8.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192722001"/>
              <criterion comment="libwmf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192722002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwmf-devel is earlier than 0:0.2.9-8.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192722003"/>
              <criterion comment="libwmf-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192722004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwmf-lite is earlier than 0:0.2.9-8.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192722005"/>
              <criterion comment="libwmf-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192722006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192726" version="637">
      <metadata>
        <title>ALSA-2019:2726: go-toolset:rhel8 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2726" ref_url="https://errata.almalinux.org/8/ALSA-2019-2726.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2726" ref_url="https://access.redhat.com/errata/RHSA-2019:2726" source="RHSA"/>
        <reference ref_id="CVE-2019-9512" ref_url="https://access.redhat.com/security/cve/CVE-2019-9512" source="CVE"/>
        <reference ref_id="CVE-2019-9514" ref_url="https://access.redhat.com/security/cve/CVE-2019-9514" source="CVE"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9512" impact="important" public="20190813:1700">CVE-2019-9512</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9514" impact="important" public="20190813:1700">CVE-2019-9514</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735645" id="1735645">CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735744" id="1735744">CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="go-toolset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519002"/>
              <criterion comment="go-toolset is earlier than 0:1.11.13-1.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519004"/>
              <criterion comment="golang is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519006"/>
              <criterion comment="golang-bin is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519008"/>
              <criterion comment="golang-docs is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519010"/>
              <criterion comment="golang-misc is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519012"/>
              <criterion comment="golang-race is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519014"/>
              <criterion comment="golang-src is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519016"/>
              <criterion comment="golang-tests is earlier than 0:1.11.13-2.module+el8.0.1+4087+d8180914" test_ref="oval:org.almalinux.alsa:tst:20192726015"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192731" version="638">
      <metadata>
        <title>ALSA-2019:2731: .NET Core on AlmaLinux security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2731" ref_url="https://errata.almalinux.org/8/ALSA-2019-2731.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2731" ref_url="https://access.redhat.com/errata/RHSA-2019:2731" source="RHSA"/>
        <reference ref_id="CVE-2019-1301" ref_url="https://access.redhat.com/security/cve/CVE-2019-1301" source="CVE"/>
        <description>NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 2.1.509 and Runtime 2.1.13.

Security Fix(es):

* dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service (CVE-2019-1301)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-1301" impact="moderate" public="20190910">CVE-2019-1301</cve>
          <bugzilla href="https://bugzilla.redhat.com/1750793" id="1750793">CVE-2019-1301 dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:2.1.509-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731001"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:2.1.13-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731003"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.13-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731005"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.13-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731007"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.509-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731009"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.509-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192731011"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192741" version="638">
      <metadata>
        <title>ALSA-2019:2741: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2741" ref_url="https://errata.almalinux.org/8/ALSA-2019-2741.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2741" ref_url="https://access.redhat.com/errata/RHSA-2019:2741" source="RHSA"/>
        <reference ref_id="CVE-2018-19824" ref_url="https://access.redhat.com/security/cve/CVE-2018-19824" source="CVE"/>
        <reference ref_id="CVE-2019-11487" ref_url="https://access.redhat.com/security/cve/CVE-2019-11487" source="CVE"/>
        <reference ref_id="CVE-2019-3846" ref_url="https://access.redhat.com/security/cve/CVE-2019-3846" source="CVE"/>
        <reference ref_id="CVE-2019-3887" ref_url="https://access.redhat.com/security/cve/CVE-2019-3887" source="CVE"/>
        <reference ref_id="CVE-2019-9500" ref_url="https://access.redhat.com/security/cve/CVE-2019-9500" source="CVE"/>
        <reference ref_id="CVE-2019-9503" ref_url="https://access.redhat.com/security/cve/CVE-2019-9503" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846)

* Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS (CVE-2019-3887)

* kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500)

* kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487)

* kernel: brcmfmac frame validation bypass (CVE-2019-9503)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* BUG: scheduling while atomic in zswap (BZ#1726362)

* kernel-rt: update to the RHEL8.0.z batch#3 source tree (BZ#1734475)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-12"/>
          <updated date="2019-09-12"/>
          <cve cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-19824" impact="moderate" public="20181204">CVE-2018-19824</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11487" impact="important" public="20190422">CVE-2019-11487</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-3846" impact="important" public="20190530:1253">CVE-2019-3846</cve>
          <cve cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-3887" impact="important" public="20190405:1600">CVE-2019-3887</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9500" impact="important" public="20190219">CVE-2019-9500</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-9503" impact="moderate" public="20190219">CVE-2019-9503</cve>
          <bugzilla href="https://bugzilla.redhat.com/1655816" id="1655816">CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695044" id="1695044">CVE-2019-3887 Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701224" id="1701224">CVE-2019-9500 kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701842" id="1701842">CVE-2019-9503 kernel: brcmfmac frame validation bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1703063" id="1703063">CVE-2019-11487 kernel: Count overflow in FUSE request leading to use-after-free issues.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1713059" id="1713059">CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.11.1.rt9.156.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192703051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.11.1.rt9.156.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192741026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.11.1.rt9.156.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192741023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192774" version="635">
      <metadata>
        <title>ALSA-2019:2774: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2774" ref_url="https://errata.almalinux.org/8/ALSA-2019-2774.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2774" ref_url="https://access.redhat.com/errata/RHSA-2019:2774" source="RHSA"/>
        <reference ref_id="CVE-2019-11739" ref_url="https://access.redhat.com/security/cve/CVE-2019-11739" source="CVE"/>
        <reference ref_id="CVE-2019-11740" ref_url="https://access.redhat.com/security/cve/CVE-2019-11740" source="CVE"/>
        <reference ref_id="CVE-2019-11742" ref_url="https://access.redhat.com/security/cve/CVE-2019-11742" source="CVE"/>
        <reference ref_id="CVE-2019-11743" ref_url="https://access.redhat.com/security/cve/CVE-2019-11743" source="CVE"/>
        <reference ref_id="CVE-2019-11744" ref_url="https://access.redhat.com/security/cve/CVE-2019-11744" source="CVE"/>
        <reference ref_id="CVE-2019-11746" ref_url="https://access.redhat.com/security/cve/CVE-2019-11746" source="CVE"/>
        <reference ref_id="CVE-2019-11752" ref_url="https://access.redhat.com/security/cve/CVE-2019-11752" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 60.9.0.

Security Fix(es):

* Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739)

* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740)

* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742)

* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744)

* Mozilla: Use-after-free while manipulating video (CVE-2019-11746)

* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752)

* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-16"/>
          <updated date="2019-09-16"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-356" href="https://access.redhat.com/security/cve/CVE-2019-11739" impact="important" public="20190915">CVE-2019-11739</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11740" impact="important" public="20190903">CVE-2019-11740</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11742" impact="important" public="20190903">CVE-2019-11742</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11743" impact="moderate" public="20190903">CVE-2019-11743</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11744" impact="important" public="20190903">CVE-2019-11744</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11746" impact="important" public="20190903">CVE-2019-11746</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11752" impact="important" public="20190903">CVE-2019-11752</cve>
          <bugzilla href="https://bugzilla.redhat.com/1748652" id="1748652">CVE-2019-11740 Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748653" id="1748653">CVE-2019-11742 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748654" id="1748654">CVE-2019-11743 Mozilla: Cross-origin access to unload event attributes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748655" id="1748655">CVE-2019-11744 Mozilla: XSS by breaking out of title and textarea elements using innerHTML</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748656" id="1748656">CVE-2019-11746 Mozilla: Use-after-free while manipulating video</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1748657" id="1748657">CVE-2019-11752 Mozilla: Use-after-free while extracting a key value in IndexedDB</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1752307" id="1752307">CVE-2019-11739 Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:60.9.0-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192774001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192798" version="636">
      <metadata>
        <title>ALSA-2019:2798: patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2798" ref_url="https://errata.almalinux.org/8/ALSA-2019-2798.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2798" ref_url="https://access.redhat.com/errata/RHSA-2019:2798" source="RHSA"/>
        <reference ref_id="CVE-2018-20969" ref_url="https://access.redhat.com/security/cve/CVE-2018-20969" source="CVE"/>
        <reference ref_id="CVE-2019-13638" ref_url="https://access.redhat.com/security/cve/CVE-2019-13638" source="CVE"/>
        <description>The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).

Security Fix(es):

* patch: do_ed_script in pch.c does not block strings beginning with a ! character (CVE-2018-20969)

* patch: OS shell command injection when processing crafted patch files (CVE-2019-13638)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-19"/>
          <updated date="2019-09-19"/>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2018-20969" impact="important" public="20190816">CVE-2018-20969</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2019-13638" impact="important" public="20190729">CVE-2019-13638</cve>
          <bugzilla href="https://bugzilla.redhat.com/1733916" id="1733916">CVE-2019-13638 patch: OS shell command injection when processing crafted patch files</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1746672" id="1746672">CVE-2018-20969 patch: do_ed_script in pch.c does not block strings beginning with a ! character</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="patch is earlier than 0:2.7.6-9.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192798001"/>
          <criterion comment="patch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192798002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192799" version="636">
      <metadata>
        <title>ALSA-2019:2799: nginx:1.14 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2799" ref_url="https://errata.almalinux.org/8/ALSA-2019-2799.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2799" ref_url="https://access.redhat.com/errata/RHSA-2019:2799" source="RHSA"/>
        <reference ref_id="CVE-2019-9511" ref_url="https://access.redhat.com/security/cve/CVE-2019-9511" source="CVE"/>
        <reference ref_id="CVE-2019-9513" ref_url="https://access.redhat.com/security/cve/CVE-2019-9513" source="CVE"/>
        <reference ref_id="CVE-2019-9516" ref_url="https://access.redhat.com/security/cve/CVE-2019-9516" source="CVE"/>
        <description>Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. 

Security Fix(es):

* HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)

* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)

* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-19"/>
          <updated date="2019-09-19"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9511" impact="important" public="20190813">CVE-2019-9511</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9513" impact="important" public="20190813:1700">CVE-2019-9513</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9516" impact="important" public="20190813">CVE-2019-9516</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735741" id="1735741">CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741860" id="1741860">CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741864" id="1741864">CVE-2019-9516 HTTP/2: 0-length headers lead to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nginx:1.14 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192799017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nginx is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990011"/>
              <criterion comment="nginx is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990012"/>
              <criterion comment="nginx is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990013"/>
              <criterion comment="nginx is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-all-modules is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990031"/>
              <criterion comment="nginx-all-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-all-modules is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990032"/>
              <criterion comment="nginx-all-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-all-modules is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990033"/>
              <criterion comment="nginx-all-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-filesystem is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990051"/>
              <criterion comment="nginx-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-filesystem is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990052"/>
              <criterion comment="nginx-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799006"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-filesystem is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990053"/>
              <criterion comment="nginx-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-image-filter is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990071"/>
              <criterion comment="nginx-mod-http-image-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-image-filter is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990072"/>
              <criterion comment="nginx-mod-http-image-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-image-filter is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990073"/>
              <criterion comment="nginx-mod-http-image-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-perl is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990091"/>
              <criterion comment="nginx-mod-http-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-perl is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990092"/>
              <criterion comment="nginx-mod-http-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-perl is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990093"/>
              <criterion comment="nginx-mod-http-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-xslt-filter is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990111"/>
              <criterion comment="nginx-mod-http-xslt-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-xslt-filter is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990112"/>
              <criterion comment="nginx-mod-http-xslt-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-xslt-filter is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990113"/>
              <criterion comment="nginx-mod-http-xslt-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-mail is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990131"/>
              <criterion comment="nginx-mod-mail is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-mail is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990132"/>
              <criterion comment="nginx-mod-mail is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-mail is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990133"/>
              <criterion comment="nginx-mod-mail is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-stream is earlier than 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990151"/>
              <criterion comment="nginx-mod-stream is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-stream is earlier than 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma" test_ref="oval:org.almalinux.alsa:tst:201927990152"/>
              <criterion comment="nginx-mod-stream is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-stream is earlier than 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma" test_ref="oval:org.almalinux.alsa:tst:201927990153"/>
              <criterion comment="nginx-mod-stream is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192822" version="637">
      <metadata>
        <title>ALSA-2019:2822: dovecot security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2822" ref_url="https://errata.almalinux.org/8/ALSA-2019-2822.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2822" ref_url="https://access.redhat.com/errata/RHSA-2019:2822" source="RHSA"/>
        <reference ref_id="CVE-2019-11500" ref_url="https://access.redhat.com/security/cve/CVE-2019-11500" source="CVE"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes (CVE-2019-11500)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-20"/>
          <updated date="2019-09-20"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-11500" impact="important" public="20190828:1200">CVE-2019-11500</cve>
          <bugzilla href="https://bugzilla.redhat.com/1741141" id="1741141">CVE-2019-11500 dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dovecot is earlier than 1:2.2.36-5.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192822001"/>
              <criterion comment="dovecot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-devel is earlier than 1:2.2.36-5.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192822003"/>
              <criterion comment="dovecot-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-mysql is earlier than 1:2.2.36-5.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192822005"/>
              <criterion comment="dovecot-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pgsql is earlier than 1:2.2.36-5.el8_0.1" test_ref="oval:org.almalinux.alsa:tst:20192822007"/>
              <criterion comment="dovecot-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192827" version="635">
      <metadata>
        <title>ALSA-2019:2827: kernel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2827" ref_url="https://errata.almalinux.org/8/ALSA-2019-2827.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2827" ref_url="https://access.redhat.com/errata/RHSA-2019:2827" source="RHSA"/>
        <reference ref_id="CVE-2019-14835" ref_url="https://access.redhat.com/security/cve/CVE-2019-14835" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-20"/>
          <updated date="2019-09-20"/>
          <cve cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-14835" impact="important" public="20190917">CVE-2019-14835</cve>
          <bugzilla href="https://bugzilla.redhat.com/1750727" id="1750727">CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-80.11.2.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192827051"/>
            <criterion comment="kernel earlier than 0:4.18.0-80.11.2.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192827052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-80.11.2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192827049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192828" version="636">
      <metadata>
        <title>ALSA-2019:2828: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2828" ref_url="https://errata.almalinux.org/8/ALSA-2019-2828.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2828" ref_url="https://access.redhat.com/errata/RHSA-2019:2828" source="RHSA"/>
        <reference ref_id="CVE-2019-14835" ref_url="https://access.redhat.com/security/cve/CVE-2019-14835" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-20"/>
          <updated date="2019-09-20"/>
          <cve cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-14835" impact="important" public="20190917">CVE-2019-14835</cve>
          <bugzilla href="https://bugzilla.redhat.com/1750727" id="1750727">CVE-2019-14835 kernel: vhost-net: guest to host kernel escape during migration</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.11.2.rt9.157.el8_0 is currently running" test_ref="oval:org.almalinux.alsa:tst:20192827051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-80.11.2.rt9.157.el8_0 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20192828026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-80.11.2.rt9.157.el8_0" test_ref="oval:org.almalinux.alsa:tst:20192828023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192893" version="636">
      <metadata>
        <title>ALSA-2019:2893: httpd:2.4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2893" ref_url="https://errata.almalinux.org/8/ALSA-2019-2893.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2893" ref_url="https://access.redhat.com/errata/RHSA-2019:2893" source="RHSA"/>
        <reference ref_id="CVE-2019-9517" ref_url="https://access.redhat.com/security/cve/CVE-2019-9517" source="CVE"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-24"/>
          <updated date="2019-09-24"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9517" impact="important" public="20190813">CVE-2019-9517</cve>
          <bugzilla href="https://bugzilla.redhat.com/1741868" id="1741868">CVE-2019-9517 HTTP/2: request for large response leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module httpd:2.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190980023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="httpd is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930011"/>
              <criterion comment="httpd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930031"/>
              <criterion comment="httpd-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930051"/>
              <criterion comment="httpd-filesystem is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930071"/>
              <criterion comment="httpd-manual is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930091"/>
              <criterion comment="httpd-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is earlier than 0:1.11.3-3.module_el8.2.0+486+c01050f0.1" test_ref="oval:org.almalinux.alsa:tst:201928930111"/>
              <criterion comment="mod_http2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930131"/>
              <criterion comment="mod_ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930151"/>
              <criterion comment="mod_md is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930171"/>
              <criterion comment="mod_proxy_html is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is earlier than 0:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930191"/>
              <criterion comment="mod_session is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is earlier than 1:2.4.37-12.module_el8.0.0+185+5908b0db" test_ref="oval:org.almalinux.alsa:tst:201928930211"/>
              <criterion comment="mod_ssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800222"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20192925" version="636">
      <metadata>
        <title>ALSA-2019:2925: nodejs:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:2925" ref_url="https://errata.almalinux.org/8/ALSA-2019-2925.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:2925" ref_url="https://access.redhat.com/errata/RHSA-2019:2925" source="RHSA"/>
        <reference ref_id="CVE-2019-5737" ref_url="https://access.redhat.com/security/cve/CVE-2019-5737" source="CVE"/>
        <reference ref_id="CVE-2019-9511" ref_url="https://access.redhat.com/security/cve/CVE-2019-9511" source="CVE"/>
        <reference ref_id="CVE-2019-9512" ref_url="https://access.redhat.com/security/cve/CVE-2019-9512" source="CVE"/>
        <reference ref_id="CVE-2019-9513" ref_url="https://access.redhat.com/security/cve/CVE-2019-9513" source="CVE"/>
        <reference ref_id="CVE-2019-9514" ref_url="https://access.redhat.com/security/cve/CVE-2019-9514" source="CVE"/>
        <reference ref_id="CVE-2019-9515" ref_url="https://access.redhat.com/security/cve/CVE-2019-9515" source="CVE"/>
        <reference ref_id="CVE-2019-9516" ref_url="https://access.redhat.com/security/cve/CVE-2019-9516" source="CVE"/>
        <reference ref_id="CVE-2019-9517" ref_url="https://access.redhat.com/security/cve/CVE-2019-9517" source="CVE"/>
        <reference ref_id="CVE-2019-9518" ref_url="https://access.redhat.com/security/cve/CVE-2019-9518" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (10.16.3).

Security Fix(es):

* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)

* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)

* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)

* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)

* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)

* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-09-30"/>
          <updated date="2019-09-30"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-5737" impact="low" public="20190228">CVE-2019-5737</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9511" impact="important" public="20190813">CVE-2019-9511</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9512" impact="important" public="20190813:1700">CVE-2019-9512</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9513" impact="important" public="20190813:1700">CVE-2019-9513</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9514" impact="important" public="20190813:1700">CVE-2019-9514</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9515" impact="important" public="20190813:1700">CVE-2019-9515</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9516" impact="important" public="20190813">CVE-2019-9516</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9517" impact="important" public="20190813">CVE-2019-9517</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9518" impact="important" public="20190813:1700">CVE-2019-9518</cve>
          <bugzilla href="https://bugzilla.redhat.com/1690808" id="1690808">CVE-2019-5737 nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735645" id="1735645">CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735741" id="1735741">CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735744" id="1735744">CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735745" id="1735745">CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735749" id="1735749">CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741860" id="1741860">CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741864" id="1741864">CVE-2019-9516 HTTP/2: 0-length headers lead to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1741868" id="1741868">CVE-2019-9517 HTTP/2: request for large response leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.16.3-2.module_el8.0.0+186+542b25fc" test_ref="oval:org.almalinux.alsa:tst:201929250011"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.16.3-2.module_el8.0.0+186+542b25fc" test_ref="oval:org.almalinux.alsa:tst:201929250031"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.16.3-2.module_el8.0.0+186+542b25fc" test_ref="oval:org.almalinux.alsa:tst:201929250051"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.9.0-1.10.16.3.2.module_el8.0.0+186+542b25fc" test_ref="oval:org.almalinux.alsa:tst:201929250111"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193134" version="637">
      <metadata>
        <title>ALSA-2019:3134: java-1.8.0-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3134" ref_url="https://errata.almalinux.org/8/ALSA-2019-3134.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3134" ref_url="https://access.redhat.com/errata/RHSA-2019:3134" source="RHSA"/>
        <reference ref_id="CVE-2019-2945" ref_url="https://access.redhat.com/security/cve/CVE-2019-2945" source="CVE"/>
        <reference ref_id="CVE-2019-2949" ref_url="https://access.redhat.com/security/cve/CVE-2019-2949" source="CVE"/>
        <reference ref_id="CVE-2019-2962" ref_url="https://access.redhat.com/security/cve/CVE-2019-2962" source="CVE"/>
        <reference ref_id="CVE-2019-2964" ref_url="https://access.redhat.com/security/cve/CVE-2019-2964" source="CVE"/>
        <reference ref_id="CVE-2019-2973" ref_url="https://access.redhat.com/security/cve/CVE-2019-2973" source="CVE"/>
        <reference ref_id="CVE-2019-2975" ref_url="https://access.redhat.com/security/cve/CVE-2019-2975" source="CVE"/>
        <reference ref_id="CVE-2019-2978" ref_url="https://access.redhat.com/security/cve/CVE-2019-2978" source="CVE"/>
        <reference ref_id="CVE-2019-2981" ref_url="https://access.redhat.com/security/cve/CVE-2019-2981" source="CVE"/>
        <reference ref_id="CVE-2019-2983" ref_url="https://access.redhat.com/security/cve/CVE-2019-2983" source="CVE"/>
        <reference ref_id="CVE-2019-2987" ref_url="https://access.redhat.com/security/cve/CVE-2019-2987" source="CVE"/>
        <reference ref_id="CVE-2019-2988" ref_url="https://access.redhat.com/security/cve/CVE-2019-2988" source="CVE"/>
        <reference ref_id="CVE-2019-2989" ref_url="https://access.redhat.com/security/cve/CVE-2019-2989" source="CVE"/>
        <reference ref_id="CVE-2019-2992" ref_url="https://access.redhat.com/security/cve/CVE-2019-2992" source="CVE"/>
        <reference ref_id="CVE-2019-2999" ref_url="https://access.redhat.com/security/cve/CVE-2019-2999" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949)

* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)

* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)

* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)

* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)

* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)

* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)

* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)

* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)

* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)

* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987)

* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)

* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)

* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-10-17"/>
          <updated date="2019-10-17"/>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2945" impact="low" public="20191015">CVE-2019-2945</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-2949" impact="important" public="20191015">CVE-2019-2949</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-2962" impact="low" public="20191015">CVE-2019-2962</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2964" impact="low" public="20191015">CVE-2019-2964</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2973" impact="low" public="20191015">CVE-2019-2973</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2975" impact="moderate" public="20191015">CVE-2019-2975</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2978" impact="moderate" public="20191015">CVE-2019-2978</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2981" impact="low" public="20191015">CVE-2019-2981</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2983" impact="low" public="20191015">CVE-2019-2983</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-2987" impact="low" public="20191015">CVE-2019-2987</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-2988" impact="low" public="20191015">CVE-2019-2988</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2989" impact="moderate" public="20191015">CVE-2019-2989</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2992" impact="low" public="20191015">CVE-2019-2992</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2999" impact="low" public="20191015">CVE-2019-2999</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760963" id="1760963">CVE-2019-2964 OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760969" id="1760969">CVE-2019-2975 OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760978" id="1760978">CVE-2019-2973 OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760980" id="1760980">CVE-2019-2981 OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760992" id="1760992">CVE-2019-2999 OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760999" id="1760999">CVE-2019-2988 OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761006" id="1761006">CVE-2019-2978 OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761146" id="1761146">CVE-2019-2992 OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761149" id="1761149">CVE-2019-2987 OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761262" id="1761262">CVE-2019-2983 OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761266" id="1761266">CVE-2019-2962 OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761594" id="1761594">CVE-2019-2949 OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761596" id="1761596">CVE-2019-2945 OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761601" id="1761601">CVE-2019-2989 OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.232.b09-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193134015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193135" version="637">
      <metadata>
        <title>ALSA-2019:3135: java-11-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3135" ref_url="https://errata.almalinux.org/8/ALSA-2019-3135.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3135" ref_url="https://access.redhat.com/errata/RHSA-2019:3135" source="RHSA"/>
        <reference ref_id="CVE-2019-2945" ref_url="https://access.redhat.com/security/cve/CVE-2019-2945" source="CVE"/>
        <reference ref_id="CVE-2019-2949" ref_url="https://access.redhat.com/security/cve/CVE-2019-2949" source="CVE"/>
        <reference ref_id="CVE-2019-2962" ref_url="https://access.redhat.com/security/cve/CVE-2019-2962" source="CVE"/>
        <reference ref_id="CVE-2019-2964" ref_url="https://access.redhat.com/security/cve/CVE-2019-2964" source="CVE"/>
        <reference ref_id="CVE-2019-2973" ref_url="https://access.redhat.com/security/cve/CVE-2019-2973" source="CVE"/>
        <reference ref_id="CVE-2019-2975" ref_url="https://access.redhat.com/security/cve/CVE-2019-2975" source="CVE"/>
        <reference ref_id="CVE-2019-2977" ref_url="https://access.redhat.com/security/cve/CVE-2019-2977" source="CVE"/>
        <reference ref_id="CVE-2019-2978" ref_url="https://access.redhat.com/security/cve/CVE-2019-2978" source="CVE"/>
        <reference ref_id="CVE-2019-2981" ref_url="https://access.redhat.com/security/cve/CVE-2019-2981" source="CVE"/>
        <reference ref_id="CVE-2019-2983" ref_url="https://access.redhat.com/security/cve/CVE-2019-2983" source="CVE"/>
        <reference ref_id="CVE-2019-2987" ref_url="https://access.redhat.com/security/cve/CVE-2019-2987" source="CVE"/>
        <reference ref_id="CVE-2019-2988" ref_url="https://access.redhat.com/security/cve/CVE-2019-2988" source="CVE"/>
        <reference ref_id="CVE-2019-2989" ref_url="https://access.redhat.com/security/cve/CVE-2019-2989" source="CVE"/>
        <reference ref_id="CVE-2019-2992" ref_url="https://access.redhat.com/security/cve/CVE-2019-2992" source="CVE"/>
        <reference ref_id="CVE-2019-2999" ref_url="https://access.redhat.com/security/cve/CVE-2019-2999" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949)

* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)

* OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977)

* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)

* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)

* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)

* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)

* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)

* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)

* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)

* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)

* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987)

* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)

* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)

* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-10-17"/>
          <updated date="2019-10-17"/>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2945" impact="low" public="20191015">CVE-2019-2945</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-2949" impact="important" public="20191015">CVE-2019-2949</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-2962" impact="low" public="20191015">CVE-2019-2962</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2964" impact="low" public="20191015">CVE-2019-2964</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2973" impact="low" public="20191015">CVE-2019-2973</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2975" impact="moderate" public="20191015">CVE-2019-2975</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-2977" impact="moderate" public="20191015">CVE-2019-2977</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2978" impact="moderate" public="20191015">CVE-2019-2978</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2981" impact="low" public="20191015">CVE-2019-2981</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2983" impact="low" public="20191015">CVE-2019-2983</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-2987" impact="low" public="20191015">CVE-2019-2987</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-2988" impact="low" public="20191015">CVE-2019-2988</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2989" impact="moderate" public="20191015">CVE-2019-2989</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2992" impact="low" public="20191015">CVE-2019-2992</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2999" impact="low" public="20191015">CVE-2019-2999</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760963" id="1760963">CVE-2019-2964 OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760969" id="1760969">CVE-2019-2975 OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760978" id="1760978">CVE-2019-2973 OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760980" id="1760980">CVE-2019-2981 OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760992" id="1760992">CVE-2019-2999 OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760999" id="1760999">CVE-2019-2988 OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761002" id="1761002">CVE-2019-2977 OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761006" id="1761006">CVE-2019-2978 OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761146" id="1761146">CVE-2019-2992 OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761149" id="1761149">CVE-2019-2987 OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761262" id="1761262">CVE-2019-2983 OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761266" id="1761266">CVE-2019-2962 OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761594" id="1761594">CVE-2019-2949 OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761596" id="1761596">CVE-2019-2945 OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761601" id="1761601">CVE-2019-2989 OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.5.10-0.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193135015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193196" version="636">
      <metadata>
        <title>ALSA-2019:3196: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3196" ref_url="https://errata.almalinux.org/8/ALSA-2019-3196.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3196" ref_url="https://access.redhat.com/errata/RHSA-2019:3196" source="RHSA"/>
        <reference ref_id="CVE-2019-11757" ref_url="https://access.redhat.com/security/cve/CVE-2019-11757" source="CVE"/>
        <reference ref_id="CVE-2019-11758" ref_url="https://access.redhat.com/security/cve/CVE-2019-11758" source="CVE"/>
        <reference ref_id="CVE-2019-11759" ref_url="https://access.redhat.com/security/cve/CVE-2019-11759" source="CVE"/>
        <reference ref_id="CVE-2019-11760" ref_url="https://access.redhat.com/security/cve/CVE-2019-11760" source="CVE"/>
        <reference ref_id="CVE-2019-11761" ref_url="https://access.redhat.com/security/cve/CVE-2019-11761" source="CVE"/>
        <reference ref_id="CVE-2019-11762" ref_url="https://access.redhat.com/security/cve/CVE-2019-11762" source="CVE"/>
        <reference ref_id="CVE-2019-11763" ref_url="https://access.redhat.com/security/cve/CVE-2019-11763" source="CVE"/>
        <reference ref_id="CVE-2019-11764" ref_url="https://access.redhat.com/security/cve/CVE-2019-11764" source="CVE"/>
        <reference ref_id="CVE-2019-15903" ref_url="https://access.redhat.com/security/cve/CVE-2019-15903" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.2.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)

* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)

* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)

* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)

* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)

* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)

* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)

* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-10-24"/>
          <updated date="2019-10-24"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11757" impact="important" public="20191022">CVE-2019-11757</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11758" impact="important" public="20191022">CVE-2019-11758</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11759" impact="moderate" public="20191022">CVE-2019-11759</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11760" impact="moderate" public="20191022">CVE-2019-11760</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-749" href="https://access.redhat.com/security/cve/CVE-2019-11761" impact="moderate" public="20191022">CVE-2019-11761</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11762" impact="moderate" public="20191022">CVE-2019-11762</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11763" impact="moderate" public="20191022">CVE-2019-11763</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11764" impact="critical" public="20191022">CVE-2019-11764</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="(CWE-122|CWE-125)" href="https://access.redhat.com/security/cve/CVE-2019-15903" impact="low" public="20190904">CVE-2019-15903</cve>
          <bugzilla href="https://bugzilla.redhat.com/1752592" id="1752592">CVE-2019-15903 expat: heap-based buffer over-read via crafted XML input</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764438" id="1764438">CVE-2019-11757 Mozilla: Use-after-free when creating index updates in IndexedDB</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764439" id="1764439">CVE-2019-11758 Mozilla: Potentially exploitable crash due to 360 Total Security</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764440" id="1764440">CVE-2019-11759 Mozilla: Stack buffer overflow in HKDF output</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764441" id="1764441">CVE-2019-11760 Mozilla: Stack buffer overflow in WebRTC networking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764442" id="1764442">CVE-2019-11761 Mozilla: Unintended access to a privileged JSONView object</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764443" id="1764443">CVE-2019-11762 Mozilla: document.domain-based origin isolation has same-origin-property violation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764444" id="1764444">CVE-2019-11763 Mozilla: Incorrect HTML parsing results in XSS bypass technique</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764446" id="1764446">CVE-2019-11764 Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.2.0-2.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193196001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193237" version="635">
      <metadata>
        <title>ALSA-2019:3237: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3237" ref_url="https://errata.almalinux.org/8/ALSA-2019-3237.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3237" ref_url="https://access.redhat.com/errata/RHSA-2019:3237" source="RHSA"/>
        <reference ref_id="CVE-2019-11757" ref_url="https://access.redhat.com/security/cve/CVE-2019-11757" source="CVE"/>
        <reference ref_id="CVE-2019-11758" ref_url="https://access.redhat.com/security/cve/CVE-2019-11758" source="CVE"/>
        <reference ref_id="CVE-2019-11759" ref_url="https://access.redhat.com/security/cve/CVE-2019-11759" source="CVE"/>
        <reference ref_id="CVE-2019-11760" ref_url="https://access.redhat.com/security/cve/CVE-2019-11760" source="CVE"/>
        <reference ref_id="CVE-2019-11761" ref_url="https://access.redhat.com/security/cve/CVE-2019-11761" source="CVE"/>
        <reference ref_id="CVE-2019-11762" ref_url="https://access.redhat.com/security/cve/CVE-2019-11762" source="CVE"/>
        <reference ref_id="CVE-2019-11763" ref_url="https://access.redhat.com/security/cve/CVE-2019-11763" source="CVE"/>
        <reference ref_id="CVE-2019-11764" ref_url="https://access.redhat.com/security/cve/CVE-2019-11764" source="CVE"/>
        <reference ref_id="CVE-2019-15903" ref_url="https://access.redhat.com/security/cve/CVE-2019-15903" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.2.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764)

* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757)

* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758)

* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759)

* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760)

* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761)

* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762)

* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)

* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-10-29"/>
          <updated date="2019-10-29"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11757" impact="important" public="20191022">CVE-2019-11757</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11758" impact="important" public="20191022">CVE-2019-11758</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11759" impact="moderate" public="20191022">CVE-2019-11759</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11760" impact="moderate" public="20191022">CVE-2019-11760</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-749" href="https://access.redhat.com/security/cve/CVE-2019-11761" impact="moderate" public="20191022">CVE-2019-11761</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2019-11762" impact="moderate" public="20191022">CVE-2019-11762</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11763" impact="moderate" public="20191022">CVE-2019-11763</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11764" impact="important" public="20191022">CVE-2019-11764</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="(CWE-122|CWE-125)" href="https://access.redhat.com/security/cve/CVE-2019-15903" impact="low" public="20190904">CVE-2019-15903</cve>
          <bugzilla href="https://bugzilla.redhat.com/1752592" id="1752592">CVE-2019-15903 expat: heap-based buffer over-read via crafted XML input</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764438" id="1764438">CVE-2019-11757 Mozilla: Use-after-free when creating index updates in IndexedDB</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764439" id="1764439">CVE-2019-11758 Mozilla: Potentially exploitable crash due to 360 Total Security</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764440" id="1764440">CVE-2019-11759 Mozilla: Stack buffer overflow in HKDF output</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764441" id="1764441">CVE-2019-11760 Mozilla: Stack buffer overflow in WebRTC networking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764442" id="1764442">CVE-2019-11761 Mozilla: Unintended access to a privileged JSONView object</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764443" id="1764443">CVE-2019-11762 Mozilla: document.domain-based origin isolation has same-origin-property violation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764444" id="1764444">CVE-2019-11763 Mozilla: Incorrect HTML parsing results in XSS bypass technique</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764446" id="1764446">CVE-2019-11764 Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.2.0-1.el8_0" test_ref="oval:org.almalinux.alsa:tst:20193237001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193309" version="636">
      <metadata>
        <title>ALSA-2019:3309: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3309" ref_url="https://errata.almalinux.org/8/ALSA-2019-3309.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3309" ref_url="https://access.redhat.com/errata/RHSA-2019:3309" source="RHSA"/>
        <reference ref_id="CVE-2018-16884" ref_url="https://access.redhat.com/security/cve/CVE-2018-16884" source="CVE"/>
        <reference ref_id="CVE-2018-19854" ref_url="https://access.redhat.com/security/cve/CVE-2018-19854" source="CVE"/>
        <reference ref_id="CVE-2018-19985" ref_url="https://access.redhat.com/security/cve/CVE-2018-19985" source="CVE"/>
        <reference ref_id="CVE-2018-20169" ref_url="https://access.redhat.com/security/cve/CVE-2018-20169" source="CVE"/>
        <reference ref_id="CVE-2019-10126" ref_url="https://access.redhat.com/security/cve/CVE-2019-10126" source="CVE"/>
        <reference ref_id="CVE-2019-10207" ref_url="https://access.redhat.com/security/cve/CVE-2019-10207" source="CVE"/>
        <reference ref_id="CVE-2019-10638" ref_url="https://access.redhat.com/security/cve/CVE-2019-10638" source="CVE"/>
        <reference ref_id="CVE-2019-11599" ref_url="https://access.redhat.com/security/cve/CVE-2019-11599" source="CVE"/>
        <reference ref_id="CVE-2019-11833" ref_url="https://access.redhat.com/security/cve/CVE-2019-11833" source="CVE"/>
        <reference ref_id="CVE-2019-11884" ref_url="https://access.redhat.com/security/cve/CVE-2019-11884" source="CVE"/>
        <reference ref_id="CVE-2019-13233" ref_url="https://access.redhat.com/security/cve/CVE-2019-13233" source="CVE"/>
        <reference ref_id="CVE-2019-14821" ref_url="https://access.redhat.com/security/cve/CVE-2019-14821" source="CVE"/>
        <reference ref_id="CVE-2019-15666" ref_url="https://access.redhat.com/security/cve/CVE-2019-15666" source="CVE"/>
        <reference ref_id="CVE-2019-15916" ref_url="https://access.redhat.com/security/cve/CVE-2019-15916" source="CVE"/>
        <reference ref_id="CVE-2019-15921" ref_url="https://access.redhat.com/security/cve/CVE-2019-15921" source="CVE"/>
        <reference ref_id="CVE-2019-15924" ref_url="https://access.redhat.com/security/cve/CVE-2019-15924" source="CVE"/>
        <reference ref_id="CVE-2019-16994" ref_url="https://access.redhat.com/security/cve/CVE-2019-16994" source="CVE"/>
        <reference ref_id="CVE-2019-3459" ref_url="https://access.redhat.com/security/cve/CVE-2019-3459" source="CVE"/>
        <reference ref_id="CVE-2019-3460" ref_url="https://access.redhat.com/security/cve/CVE-2019-3460" source="CVE"/>
        <reference ref_id="CVE-2019-3874" ref_url="https://access.redhat.com/security/cve/CVE-2019-3874" source="CVE"/>
        <reference ref_id="CVE-2019-3882" ref_url="https://access.redhat.com/security/cve/CVE-2019-3882" source="CVE"/>
        <reference ref_id="CVE-2019-3900" ref_url="https://access.redhat.com/security/cve/CVE-2019-3900" source="CVE"/>
        <reference ref_id="CVE-2019-5489" ref_url="https://access.redhat.com/security/cve/CVE-2019-5489" source="CVE"/>
        <reference ref_id="CVE-2019-7222" ref_url="https://access.redhat.com/security/cve/CVE-2019-7222" source="CVE"/>
        <reference ref_id="CVE-2019-9506" ref_url="https://access.redhat.com/security/cve/CVE-2019-9506" source="CVE"/>
        <reference ref_id="CVE-2020-10720" ref_url="https://access.redhat.com/security/cve/CVE-2020-10720" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)

* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)

* Kernel: page cache side channel attacks (CVE-2019-5489)

* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

* kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)

* kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)

* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)

* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)

* kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)

* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)

* kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)

* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)

* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)

* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)

* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)

* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)

* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)

* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)

* Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-16884" impact="important" public="20181127">CVE-2018-16884</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-19854" impact="moderate" public="20181103">CVE-2018-19854</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19985" impact="low" public="20181212">CVE-2018-19985</cve>
          <cve cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2018-20169" impact="moderate" public="20181205">CVE-2018-20169</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-10126" impact="important" public="20190531">CVE-2019-10126</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-10207" impact="moderate" public="20190729:1300">CVE-2019-10207</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-331-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10638" impact="low" public="20190715">CVE-2019-10638</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-362-&gt;CWE-667" href="https://access.redhat.com/security/cve/CVE-2019-11599" impact="moderate" public="20190419">CVE-2019-11599</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-456-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11833" impact="moderate" public="20190511">CVE-2019-11833</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11884" impact="moderate" public="20190510">CVE-2019-11884</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-13233" impact="moderate" public="20190704">CVE-2019-13233</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-14821" impact="important" public="20190917:1700">CVE-2019-14821</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-15666" impact="moderate" public="20190827">CVE-2019-15666</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-15916" impact="moderate" public="20190904">CVE-2019-15916</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://access.redhat.com/security/cve/CVE-2019-15921" impact="low" public="20190904">CVE-2019-15921</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-15924" impact="low" public="20190904">CVE-2019-15924</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-16994" impact="low" public="20190930">CVE-2019-16994</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3459" impact="moderate" public="20190111">CVE-2019-3459</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3460" impact="moderate" public="20190111">CVE-2019-3460</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-3874" impact="moderate" public="20190319">CVE-2019-3874</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-3882" impact="moderate" public="20190402">CVE-2019-3882</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-3900" impact="important" public="20190425">CVE-2019-3900</cve>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-5489" impact="important" public="20190106">CVE-2019-5489</cve>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-7222" impact="low" public="20190207">CVE-2019-7222</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2019-9506" impact="important" public="20190810:0900">CVE-2019-9506</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10720" impact="moderate" public="20191209:1423">CVE-2020-10720</cve>
          <bugzilla href="https://bugzilla.redhat.com/1656986" id="1656986">CVE-2018-19854 kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660375" id="1660375">CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660385" id="1660385">CVE-2018-20169 kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663176" id="1663176">CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663179" id="1663179">CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1664110" id="1664110">CVE-2019-5489 Kernel: page cache side channel attacks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666106" id="1666106">CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1671930" id="1671930">CVE-2019-7222 Kernel: KVM: leak of uninitialized stack contents to guest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1686373" id="1686373">CVE-2019-3874 kernel: SCTP socket buffer memory leak leading to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1689426" id="1689426">CVE-2019-3882 kernel: denial of service vector through vfio DMA mappings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1698757" id="1698757">CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705937" id="1705937">CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709837" id="1709837">CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712072" id="1712072">CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1716992" id="1716992">CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1727756" id="1727756">CVE-2019-13233 kernel: use-after-free in arch/x86/lib/insn-eval.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1727857" id="1727857">CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1729931" id="1729931">CVE-2019-10638 Kernel: net: weak IP ID generation leads to remote device tracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1733874" id="1733874">CVE-2019-10207 kernel: null-pointer dereference in hci_uart_set_flow_control</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1746708" id="1746708">CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1747334" id="1747334">CVE-2019-15666 kernel: out-of-bounds array access in __xfrm_policy_unlink</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1750813" id="1750813">CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1759681" id="1759681">CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760958" id="1760958">CVE-2019-15921 kernel: memory leak in genl_register_family() in net/netlink/genetlink.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763869" id="1763869">CVE-2019-15924 kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781204" id="1781204">CVE-2020-10720 kernel: use-after-free read in napi_gro_frags() in the Linux kernel</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.rt24.93.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193309025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.rt24.93.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193309026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-147.rt24.93.el8" test_ref="oval:org.almalinux.alsa:tst:20193309023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193335" version="637">
      <metadata>
        <title>ALSA-2019:3335: python27:2.7 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3335" ref_url="https://errata.almalinux.org/8/ALSA-2019-3335.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3335" ref_url="https://access.redhat.com/errata/RHSA-2019:3335" source="RHSA"/>
        <reference ref_id="CVE-2019-11236" ref_url="https://access.redhat.com/security/cve/CVE-2019-11236" source="CVE"/>
        <reference ref_id="CVE-2019-11324" ref_url="https://access.redhat.com/security/cve/CVE-2019-11324" source="CVE"/>
        <reference ref_id="CVE-2019-6446" ref_url="https://access.redhat.com/security/cve/CVE-2019-6446" source="CVE"/>
        <reference ref_id="CVE-2019-9740" ref_url="https://access.redhat.com/security/cve/CVE-2019-9740" source="CVE"/>
        <reference ref_id="CVE-2019-9947" ref_url="https://access.redhat.com/security/cve/CVE-2019-9947" source="CVE"/>
        <reference ref_id="CVE-2019-9948" ref_url="https://access.redhat.com/security/cve/CVE-2019-9948" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.

Security Fix(es):

* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)

* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)

* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)

* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)

* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)

* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-11236" impact="moderate" public="20190313">CVE-2019-11236</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-11324" impact="moderate" public="20190417">CVE-2019-11324</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-358-&gt;CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6446" impact="moderate" public="20190116">CVE-2019-6446</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-9740" impact="moderate" public="20190313">CVE-2019-9740</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-9947" impact="moderate" public="20190323">CVE-2019-9947</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-749" href="https://access.redhat.com/security/cve/CVE-2019-9948" impact="moderate" public="20190323">CVE-2019-9948</cve>
          <bugzilla href="https://bugzilla.redhat.com/1667950" id="1667950">CVE-2019-6446 numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688169" id="1688169">CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695570" id="1695570">CVE-2019-9948 python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695572" id="1695572">CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700824" id="1700824">CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702473" id="1702473">CVE-2019-11324 python-urllib3: Certification mishandle when error should be thrown</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python27:2.7 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190981119"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350011"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350012"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350013"/>
              <criterion comment="babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810022"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350031"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350032"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350033"/>
              <criterion comment="python-nose-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350051"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350052"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350053"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933350071"/>
              <criterion comment="python-sqlalchemy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2 is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350091"/>
              <criterion comment="python2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350111"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350112"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350131"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350132"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350151"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350152"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350171"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350172"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350173"/>
              <criterion comment="python2-babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350191"/>
              <criterion comment="python2-backports is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350192"/>
              <criterion comment="python2-backports is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350211"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350212"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350231"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350232"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350233"/>
              <criterion comment="python2-bson is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350251"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350252"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350271"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350272"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-debug is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350291"/>
              <criterion comment="python2-debug is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-devel is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350311"/>
              <criterion comment="python2-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350331"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350332"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350351"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350352"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350371"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350372"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350391"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350392"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350411"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350412"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350431"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350432"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350451"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350452"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350471"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350472"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350473"/>
              <criterion comment="python2-jinja2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810482"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-libs is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350491"/>
              <criterion comment="python2-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810502"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350511"/>
              <criterion comment="python2-lxml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350512"/>
              <criterion comment="python2-lxml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350531"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350532"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350551"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350552"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350571"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350572"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350573"/>
              <criterion comment="python2-nose is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810582"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350591"/>
              <criterion comment="python2-numpy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350592"/>
              <criterion comment="python2-numpy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810602"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350611"/>
              <criterion comment="python2-numpy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981062"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350612"/>
              <criterion comment="python2-numpy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350631"/>
              <criterion comment="python2-numpy-f2py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350632"/>
              <criterion comment="python2-numpy-f2py is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810642"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip is earlier than 0:9.0.3-14.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350651"/>
              <criterion comment="python2-pip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810662"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip-wheel is earlier than 0:9.0.3-14.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350671"/>
              <criterion comment="python2-pip-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933350682"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350691"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350692"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350711"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350712"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350713"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350731"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350732"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350733"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350751"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350752"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350753"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350771"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350772"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350791"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350792"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350793"/>
              <criterion comment="python2-pygments is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810782"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350811"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350812"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350813"/>
              <criterion comment="python2-pymongo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810802"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350831"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350832"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350833"/>
              <criterion comment="python2-pymongo-gridfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810822"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350851"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350852"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350871"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350872"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350891"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350892"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350911"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350912"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350931"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350932"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-2.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933350951"/>
              <criterion comment="python2-requests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810942"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350971"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350972"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350991"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350992"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350993"/>
              <criterion comment="python2-scipy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810982"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools is earlier than 0:39.0.1-11.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351011"/>
              <criterion comment="python2-setuptools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811002"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools-wheel is earlier than 0:39.0.1-11.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351031"/>
              <criterion comment="python2-setuptools-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933351051"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933351052"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351071"/>
              <criterion comment="python2-six is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981104"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351072"/>
              <criterion comment="python2-six is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-sqlalchemy is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351091"/>
              <criterion comment="python2-sqlalchemy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-test is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933351111"/>
              <criterion comment="python2-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tkinter is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933351131"/>
              <criterion comment="python2-tkinter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tools is earlier than 0:2.7.16-12.module_el8.1.0+219+cf9e6ac9" test_ref="oval:org.almalinux.alsa:tst:201933351151"/>
              <criterion comment="python2-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351171"/>
              <criterion comment="python2-urllib3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981114"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351172"/>
              <criterion comment="python2-urllib3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351191"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351192"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351193"/>
              <criterion comment="python2-virtualenv is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811162"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351211"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351212"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351213"/>
              <criterion comment="python2-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351231"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351232"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351233"/>
              <criterion comment="python2-wheel-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351242"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193338" version="638">
      <metadata>
        <title>ALSA-2019:3338: edk2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3338" ref_url="https://errata.almalinux.org/8/ALSA-2019-3338.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3338" ref_url="https://access.redhat.com/errata/RHSA-2019:3338" source="RHSA"/>
        <reference ref_id="CVE-2018-12181" ref_url="https://access.redhat.com/security/cve/CVE-2018-12181" source="CVE"/>
        <reference ref_id="CVE-2019-0160" ref_url="https://access.redhat.com/security/cve/CVE-2019-0160" source="CVE"/>
        <reference ref_id="CVE-2019-0161" ref_url="https://access.redhat.com/security/cve/CVE-2019-0161" source="CVE"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.

Security Fix(es):

* edk2: Stack buffer overflow with corrupted BMP (CVE-2018-12181)

* edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media (CVE-2019-0160)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-12181" impact="moderate" public="20190307">CVE-2018-12181</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="(CWE-122|CWE-121)" href="https://access.redhat.com/security/cve/CVE-2019-0160" impact="moderate" public="20190226">CVE-2019-0160</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-121-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-0161" impact="moderate" public="20180605">CVE-2019-0161</cve>
          <bugzilla href="https://bugzilla.redhat.com/1686783" id="1686783">CVE-2018-12181 edk2: Stack buffer overflow with corrupted BMP</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1691640" id="1691640">CVE-2019-0160 edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1694065" id="1694065">CVE-2019-0161 edk2: stack overflow in XHCI causing denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="edk2-aarch64 is earlier than 0:20190308git89910a39dcfd-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193338001"/>
              <criterion comment="edk2-aarch64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="edk2-ovmf is earlier than 0:20190308git89910a39dcfd-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193338003"/>
              <criterion comment="edk2-ovmf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193345" version="641">
      <metadata>
        <title>ALSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3345" ref_url="https://errata.almalinux.org/8/ALSA-2019-3345.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3345" ref_url="https://access.redhat.com/errata/RHSA-2019:3345" source="RHSA"/>
        <reference ref_id="CVE-2019-12155" ref_url="https://access.redhat.com/security/cve/CVE-2019-12155" source="CVE"/>
        <reference ref_id="CVE-2019-9755" ref_url="https://access.redhat.com/security/cve/CVE-2019-9755" source="CVE"/>
        <reference ref_id="CVE-2019-9824" ref_url="https://access.redhat.com/security/cve/CVE-2019-9824" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)

* QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)

* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-12155" impact="low" public="20190425">CVE-2019-12155</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9755" impact="low" public="20190321">CVE-2019-9755</cve>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-9824" impact="low" public="20190301">CVE-2019-9824</cve>
          <bugzilla href="https://bugzilla.redhat.com/1678515" id="1678515">CVE-2019-9824 QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1691624" id="1691624">CVE-2019-9755 ntfs-3g: heap-based buffer overflow leads to local root privilege escalation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712670" id="1712670">CVE-2019-12155 QEMU: qxl: null pointer dereference while releasing spice resources</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20171214-6.gitfa98132.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450011"/>
                  <criterion comment="SLOF is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450031"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450051"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450071"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450091"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450111"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450131"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450151"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450171"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450231"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450251"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450271"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450331"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450351"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450371"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450391"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450411"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450431"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345051"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345053"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345055"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345057"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345059"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345061"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345063"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345065"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345067"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345069"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345071"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345073"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345075"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345077"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345079"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345081"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345083"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345085"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345087"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345089"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345091"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345093"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345095"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450971"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345099"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345101"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345103"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345105"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345107"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451091"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451111"/>
                  <criterion comment="nbdkit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451131"/>
                  <criterion comment="nbdkit-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751162"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451151"/>
                  <criterion comment="nbdkit-basic-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451171"/>
                  <criterion comment="nbdkit-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451191"/>
                  <criterion comment="nbdkit-example-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451211"/>
                  <criterion comment="nbdkit-plugin-gzip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451231"/>
                  <criterion comment="nbdkit-plugin-python-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451251"/>
                  <criterion comment="nbdkit-plugin-python3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451271"/>
                  <criterion comment="nbdkit-plugin-vddk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751302"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451291"/>
                  <criterion comment="nbdkit-plugin-xz is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751322"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451371"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451391"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451411"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451431"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451451"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451471"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451491"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451511"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451531"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451551"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451571"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451591"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451611"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451631"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451651"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933451671"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451691"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451711"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451731"/>
                  <criterion comment="seabios is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451751"/>
                  <criterion comment="seabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751782"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451771"/>
                  <criterion comment="seavgabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751802"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451831"/>
                  <criterion comment="supermin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451851"/>
                  <criterion comment="supermin-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451871"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451891"/>
                  <criterion comment="virt-p2v-maker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451911"/>
                  <criterion comment="virt-v2v is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751942"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451941"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451951"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451961"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345200"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345201"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345203"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345204"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345205"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345206"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345207"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345208"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345209"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345210"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345211"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345212"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345213"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345214"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345215"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345216"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345217"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345218"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345219"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452201"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345221"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345223"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.module+el8.1.0+4227+b2722cb3" test_ref="oval:org.almalinux.alsa:tst:20193345224"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452281"/>
                  <criterion comment="ocaml-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452292"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452301"/>
                  <criterion comment="ocaml-hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452312"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452321"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452341"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452361"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452371"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452381"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452391"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:201933452401"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452421"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193352" version="639">
      <metadata>
        <title>ALSA-2019:3352: gdb security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3352" ref_url="https://errata.almalinux.org/8/ALSA-2019-3352.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3352" ref_url="https://access.redhat.com/errata/RHSA-2019:3352" source="RHSA"/>
        <reference ref_id="CVE-2018-20657" ref_url="https://access.redhat.com/security/cve/CVE-2018-20657" source="CVE"/>
        <description>The GNU Debugger (GDB) allows users to debug programs written in various programming languages including C, C++, and Fortran. 

Security Fix(es):

* libiberty: Memory leak in demangle_template function resulting in a denial of service (CVE-2018-20657)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-20657" impact="low" public="20181218">CVE-2018-20657</cve>
          <bugzilla href="https://bugzilla.redhat.com/1664708" id="1664708">CVE-2018-20657 libiberty: Memory leak in demangle_template function resulting in a denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gdb is earlier than 0:8.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193352001"/>
              <criterion comment="gdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-doc is earlier than 0:8.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193352003"/>
              <criterion comment="gdb-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-gdbserver is earlier than 0:8.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193352005"/>
              <criterion comment="gdb-gdbserver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-headless is earlier than 0:8.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193352007"/>
              <criterion comment="gdb-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193353" version="641">
      <metadata>
        <title>ALSA-2019:3353: freeradius:3.0 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3353" ref_url="https://errata.almalinux.org/8/ALSA-2019-3353.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3353" ref_url="https://access.redhat.com/errata/RHSA-2019:3353" source="RHSA"/>
        <reference ref_id="CVE-2019-10143" ref_url="https://access.redhat.com/security/cve/CVE-2019-10143" source="CVE"/>
        <description>FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-266|CWE-250)" href="https://access.redhat.com/security/cve/CVE-2019-10143" impact="moderate" public="20190501">CVE-2019-10143</cve>
          <bugzilla href="https://bugzilla.redhat.com/1705340" id="1705340">CVE-2019-10143 freeradius: privilege escalation due to insecure logrotate configuration</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module freeradius:3.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191142025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530011"/>
              <criterion comment="freeradius is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530031"/>
              <criterion comment="freeradius-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530051"/>
              <criterion comment="freeradius-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530071"/>
              <criterion comment="freeradius-krb5 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530091"/>
              <criterion comment="freeradius-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530111"/>
              <criterion comment="freeradius-mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530131"/>
              <criterion comment="freeradius-perl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530151"/>
              <criterion comment="freeradius-postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530171"/>
              <criterion comment="freeradius-rest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530191"/>
              <criterion comment="freeradius-sqlite is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530211"/>
              <criterion comment="freeradius-unixODBC is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.17-6.module_el8.1.0+198+858eb655" test_ref="oval:org.almalinux.alsa:tst:201933530231"/>
              <criterion comment="freeradius-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420242"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193387" version="638">
      <metadata>
        <title>ALSA-2019:3387: osinfo-db and libosinfo security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3387" ref_url="https://errata.almalinux.org/8/ALSA-2019-3387.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3387" ref_url="https://access.redhat.com/errata/RHSA-2019:3387" source="RHSA"/>
        <reference ref_id="CVE-2019-13313" ref_url="https://access.redhat.com/security/cve/CVE-2019-13313" source="CVE"/>
        <description>The osinfo-db package contains a database that provides information about operating systems and hypervisor platforms to facilitate the automated configuration and provisioning of new virtual machines. 

The libosinfo packages provide a library that allows virtualization provisioning tools to determine the optimal device settings for a combination of hypervisor and operating system.

Security Fix(es):

* Libosinfo: osinfo-install-script option leaks password via command line argument (CVE-2019-13313)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-214-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-13313" impact="low" public="20190705">CVE-2019-13313</cve>
          <bugzilla href="https://bugzilla.redhat.com/1727766" id="1727766">CVE-2019-13313 Libosinfo: osinfo-install-script option leaks password via command line argument</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="osinfo-db-tools is earlier than 0:1.5.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193387001"/>
              <criterion comment="osinfo-db-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193387002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="osinfo-db is earlier than 0:20190611-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193387003"/>
              <criterion comment="osinfo-db is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193387004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libosinfo is earlier than 0:1.5.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193387005"/>
              <criterion comment="libosinfo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193387006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-boxes is earlier than 0:3.28.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193387007"/>
              <criterion comment="gnome-boxes is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193387008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193390" version="637">
      <metadata>
        <title>ALSA-2019:3390: qt5-qtbase security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3390" ref_url="https://errata.almalinux.org/8/ALSA-2019-3390.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3390" ref_url="https://access.redhat.com/errata/RHSA-2019:3390" source="RHSA"/>
        <reference ref_id="CVE-2018-15518" ref_url="https://access.redhat.com/security/cve/CVE-2018-15518" source="CVE"/>
        <reference ref_id="CVE-2018-19870" ref_url="https://access.redhat.com/security/cve/CVE-2018-19870" source="CVE"/>
        <reference ref_id="CVE-2018-19873" ref_url="https://access.redhat.com/security/cve/CVE-2018-19873" source="CVE"/>
        <description>Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt.

Security Fix(es):

* qt5-qtbase: Double free in QXmlStreamReader (CVE-2018-15518)

* qt5-qtbase: QImage allocation failure in qgifhandler (CVE-2018-19870)

* qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file (CVE-2018-19873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-15518" impact="moderate" public="20180813">CVE-2018-15518</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2018-19870" impact="low" public="20181206">CVE-2018-19870</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2018-19873" impact="low" public="20181206">CVE-2018-19873</cve>
          <bugzilla href="https://bugzilla.redhat.com/1658996" id="1658996">CVE-2018-19870 qt5-qtbase: QImage allocation failure in qgifhandler</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1658998" id="1658998">CVE-2018-19873 qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1659000" id="1659000">CVE-2018-15518 qt5-qtbase: Double free in QXmlStreamReader</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="qt5-qtbase is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390001"/>
              <criterion comment="qt5-qtbase is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-common is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390003"/>
              <criterion comment="qt5-qtbase-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-devel is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390005"/>
              <criterion comment="qt5-qtbase-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-examples is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390007"/>
              <criterion comment="qt5-qtbase-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-gui is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390009"/>
              <criterion comment="qt5-qtbase-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-mysql is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390011"/>
              <criterion comment="qt5-qtbase-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-odbc is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390013"/>
              <criterion comment="qt5-qtbase-odbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-postgresql is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390015"/>
              <criterion comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-static is earlier than 0:5.11.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193390017"/>
              <criterion comment="qt5-qtbase-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-assistant is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390019"/>
              <criterion comment="qt5-assistant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-designer is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390021"/>
              <criterion comment="qt5-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-doctools is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390023"/>
              <criterion comment="qt5-doctools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-linguist is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390025"/>
              <criterion comment="qt5-linguist is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qdbusviewer is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390027"/>
              <criterion comment="qt5-qdbusviewer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390029"/>
              <criterion comment="qt5-qttools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-common is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390031"/>
              <criterion comment="qt5-qttools-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-devel is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390033"/>
              <criterion comment="qt5-qttools-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-examples is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390035"/>
              <criterion comment="qt5-qttools-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designer is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390037"/>
              <criterion comment="qt5-qttools-libs-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designercomponents is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390039"/>
              <criterion comment="qt5-qttools-libs-designercomponents is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-help is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390041"/>
              <criterion comment="qt5-qttools-libs-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-static is earlier than 0:5.11.1-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193390043"/>
              <criterion comment="qt5-qttools-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390044"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193391" version="637">
      <metadata>
        <title>ALSA-2019:3391: libreswan security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3391" ref_url="https://errata.almalinux.org/8/ALSA-2019-3391.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3391" ref_url="https://access.redhat.com/errata/RHSA-2019:3391" source="RHSA"/>
        <reference ref_id="CVE-2019-10155" ref_url="https://access.redhat.com/security/cve/CVE-2019-10155" source="CVE"/>
        <reference ref_id="CVE-2019-12312" ref_url="https://access.redhat.com/security/cve/CVE-2019-12312" source="CVE"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

The following packages have been upgraded to a later upstream version: libreswan (3.29). (BZ#1738853)

Security Fix(es):

* libreswan: vulnerability in the processing of IKEv1 informational packets due to missing integrity check (CVE-2019-10155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-354" href="https://access.redhat.com/security/cve/CVE-2019-10155" impact="low" public="20190610">CVE-2019-10155</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-12312" impact="moderate" public="20190512">CVE-2019-12312</cve>
          <bugzilla href="https://bugzilla.redhat.com/1714141" id="1714141">CVE-2019-10155 libreswan: vulnerability in the processing of IKEv1 informational packets due to missing integrity check</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1716918" id="1716918">CVE-2019-12312 libreswan: null-pointer dereference by sending two IKEv2 packets</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="libreswan is earlier than 0:3.29-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193391001"/>
          <criterion comment="libreswan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193391002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193401" version="640">
      <metadata>
        <title>ALSA-2019:3401: 389-ds:1.4 security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3401" ref_url="https://errata.almalinux.org/8/ALSA-2019-3401.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3401" ref_url="https://access.redhat.com/errata/RHSA-2019:3401" source="RHSA"/>
        <reference ref_id="CVE-2018-10871" ref_url="https://access.redhat.com/security/cve/CVE-2018-10871" source="CVE"/>
        <reference ref_id="CVE-2019-10224" ref_url="https://access.redhat.com/security/cve/CVE-2019-10224" source="CVE"/>
        <reference ref_id="CVE-2019-14824" ref_url="https://access.redhat.com/security/cve/CVE-2019-14824" source="CVE"/>
        <reference ref_id="CVE-2019-3883" ref_url="https://access.redhat.com/security/cve/CVE-2019-3883" source="CVE"/>
        <description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

The following packages have been upgraded to a later upstream version: 389-ds-base (1.4.1.3). (BZ#1712467)

Security Fix(es):

* 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)

* 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default (CVE-2018-10871)

* 389-ds-base: DoS via hanging secured connections (CVE-2019-3883)

* 389-ds-base: using dscreate in verbose mode results in information disclosure (CVE-2019-10224)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-312" href="https://access.redhat.com/security/cve/CVE-2018-10871" impact="moderate" public="20180618">CVE-2018-10871</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-10224" impact="low" public="20181127">CVE-2019-10224</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2019-14824" impact="important" public="20191104:0914">CVE-2019-14824</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-772" href="https://access.redhat.com/security/cve/CVE-2019-3883" impact="moderate" public="20190412">CVE-2019-3883</cve>
          <bugzilla href="https://bugzilla.redhat.com/1591480" id="1591480">CVE-2018-10871 389-ds-base: replication and the Retro Changelog plugin store plaintext password by default</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677147" id="1677147">CVE-2019-10224 389-ds-base: using dscreate in verbose mode results in information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1693612" id="1693612">CVE-2019-3883 389-ds-base: DoS via hanging secured connections</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1747448" id="1747448">CVE-2019-14824 389-ds-base: Read permission check bypass via the deref plugin</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module 389-ds:1.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193401013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="389-ds-base is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010011"/>
              <criterion comment="389-ds-base is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="389-ds-base-devel is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010031"/>
              <criterion comment="389-ds-base-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="389-ds-base-legacy-tools is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010051"/>
              <criterion comment="389-ds-base-legacy-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="389-ds-base-libs is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010071"/>
              <criterion comment="389-ds-base-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="389-ds-base-snmp is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010091"/>
              <criterion comment="389-ds-base-snmp is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-lib389 is earlier than 0:1.4.1.3-7.module_el8.1.0+234+96aec258" test_ref="oval:org.almalinux.alsa:tst:201934010111"/>
              <criterion comment="python3-lib389 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934010122"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193403" version="639">
      <metadata>
        <title>ALSA-2019:3403: container-tools:rhel8 security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3403" ref_url="https://errata.almalinux.org/8/ALSA-2019-3403.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3403" ref_url="https://access.redhat.com/errata/RHSA-2019:3403" source="RHSA"/>
        <reference ref_id="CVE-2019-10214" ref_url="https://access.redhat.com/security/cve/CVE-2019-10214" source="CVE"/>
        <reference ref_id="CVE-2019-14378" ref_url="https://access.redhat.com/security/cve/CVE-2019-14378" source="CVE"/>
        <reference ref_id="CVE-2019-9946" ref_url="https://access.redhat.com/security/cve/CVE-2019-9946" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)

* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-10214" impact="moderate" public="20190909">CVE-2019-10214</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14378" impact="important" public="20190728">CVE-2019-14378</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-841" href="https://access.redhat.com/security/cve/CVE-2019-9946" impact="moderate" public="20190328">CVE-2019-9946</cve>
          <bugzilla href="https://bugzilla.redhat.com/1692712" id="1692712">CVE-2019-9946 kubernetes: Incorrect rule injection in CNI portmap plugin</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732508" id="1732508">CVE-2019-10214 containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1734745" id="1734745">CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.9.0-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.9.0-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="cockpit-podman is earlier than 0:4-1.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="container-selinux is earlier than 2:2.107-2.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.1-2.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:0.1.37-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
              <criterion comment="fuse-overlayfs is earlier than 0:0.4.1-1.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201934030151"/>
              <criterion comment="oci-systemd-hook is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.0.0+194+ac560166" test_ref="oval:org.almalinux.alsa:tst:201934030171"/>
              <criterion comment="oci-umount is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.4.2-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.4.2-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-manpages is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403024"/>
              <criterion comment="podman-manpages is earlier than 0:1.4.2-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.4.2-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.4.2-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
              <criterion comment="runc is earlier than 0:1.0.0-60.rc8.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:0.1.37-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
              <criterion comment="skopeo-tests is earlier than 1:0.1.37-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:0.3.0-4.module+el8.1.0+4306+1d917805" test_ref="oval:org.almalinux.alsa:tst:20193403037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.4-1.module_el8.1.0+293+ad8ef41f" test_ref="oval:org.almalinux.alsa:tst:201934030391"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193419" version="636">
      <metadata>
        <title>ALSA-2019:3419: libtiff security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3419" ref_url="https://errata.almalinux.org/8/ALSA-2019-3419.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3419" ref_url="https://access.redhat.com/errata/RHSA-2019:3419" source="RHSA"/>
        <reference ref_id="CVE-2018-12900" ref_url="https://access.redhat.com/security/cve/CVE-2018-12900" source="CVE"/>
        <description>The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

* libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution (CVE-2018-12900)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2018-12900" impact="moderate" public="20180626">CVE-2018-12900</cve>
          <bugzilla href="https://bugzilla.redhat.com/1595575" id="1595575">CVE-2018-12900 libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libtiff is earlier than 0:4.0.9-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193419001"/>
              <criterion comment="libtiff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-devel is earlier than 0:4.0.9-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193419003"/>
              <criterion comment="libtiff-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-tools is earlier than 0:4.0.9-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193419005"/>
              <criterion comment="libtiff-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193421" version="638">
      <metadata>
        <title>ALSA-2019:3421: mod_auth_mellon security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3421" ref_url="https://errata.almalinux.org/8/ALSA-2019-3421.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3421" ref_url="https://access.redhat.com/errata/RHSA-2019:3421" source="RHSA"/>
        <reference ref_id="CVE-2019-3877" ref_url="https://access.redhat.com/security/cve/CVE-2019-3877" source="CVE"/>
        <description>The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.

Security Fix(es):

* mod_auth_mellon: open redirect in logout url when using URLs with backslashes (CVE-2019-3877)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2019-3877" impact="moderate" public="20190322">CVE-2019-3877</cve>
          <bugzilla href="https://bugzilla.redhat.com/1691125" id="1691125">CVE-2019-3877 mod_auth_mellon: open redirect in logout url when using URLs with backslashes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mod_auth_mellon is earlier than 0:0.14.0-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193421001"/>
              <criterion comment="mod_auth_mellon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190985002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_auth_mellon-diagnostics is earlier than 0:0.14.0-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193421003"/>
              <criterion comment="mod_auth_mellon-diagnostics is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193421004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193433" version="638">
      <metadata>
        <title>ALSA-2019:3433: go-toolset:rhel8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3433" ref_url="https://errata.almalinux.org/8/ALSA-2019-3433.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3433" ref_url="https://access.redhat.com/errata/RHSA-2019:3433" source="RHSA"/>
        <reference ref_id="CVE-2019-14809" ref_url="https://access.redhat.com/security/cve/CVE-2019-14809" source="CVE"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

* golang: malformed hosts in URLs leads to authorization bypass (CVE-2019-14809)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20-&gt;CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-14809" impact="moderate" public="20190813">CVE-2019-14809</cve>
          <bugzilla href="https://bugzilla.redhat.com/1743129" id="1743129">CVE-2019-14809 golang: malformed hosts in URLs leads to authorization bypass</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="go-toolset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519002"/>
              <criterion comment="go-toolset is earlier than 0:1.12.8-1.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519004"/>
              <criterion comment="golang is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519006"/>
              <criterion comment="golang-bin is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519008"/>
              <criterion comment="golang-docs is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519010"/>
              <criterion comment="golang-misc is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519012"/>
              <criterion comment="golang-race is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519014"/>
              <criterion comment="golang-src is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519016"/>
              <criterion comment="golang-tests is earlier than 0:1.12.8-2.module+el8.1.0+4089+be929cf8" test_ref="oval:org.almalinux.alsa:tst:20193433015"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193436" version="637">
      <metadata>
        <title>ALSA-2019:3436: httpd:2.4 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3436" ref_url="https://errata.almalinux.org/8/ALSA-2019-3436.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3436" ref_url="https://access.redhat.com/errata/RHSA-2019:3436" source="RHSA"/>
        <reference ref_id="CVE-2019-0217" ref_url="https://access.redhat.com/security/cve/CVE-2019-0217" source="CVE"/>
        <reference ref_id="CVE-2019-0220" ref_url="https://access.redhat.com/security/cve/CVE-2019-0220" source="CVE"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: mod_auth_digest: access control bypass due to race condition (CVE-2019-0217)

* httpd: URL normalization inconsistency (CVE-2019-0220)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0217" impact="moderate" public="20190401">CVE-2019-0217</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-41" href="https://access.redhat.com/security/cve/CVE-2019-0220" impact="low" public="20190401">CVE-2019-0220</cve>
          <bugzilla href="https://bugzilla.redhat.com/1695020" id="1695020">CVE-2019-0217 httpd: mod_auth_digest: access control bypass due to race condition</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695036" id="1695036">CVE-2019-0220 httpd: URL normalization inconsistency</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module httpd:2.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190980023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="httpd is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360011"/>
              <criterion comment="httpd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360031"/>
              <criterion comment="httpd-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360051"/>
              <criterion comment="httpd-filesystem is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360071"/>
              <criterion comment="httpd-manual is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360091"/>
              <criterion comment="httpd-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is earlier than 0:1.11.3-3.module_el8.2.0+486+c01050f0.1" test_ref="oval:org.almalinux.alsa:tst:201934360111"/>
              <criterion comment="mod_http2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360131"/>
              <criterion comment="mod_ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360151"/>
              <criterion comment="mod_md is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360171"/>
              <criterion comment="mod_proxy_html is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is earlier than 0:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360191"/>
              <criterion comment="mod_session is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is earlier than 1:2.4.37-16.module_el8.1.0+256+ae790463" test_ref="oval:org.almalinux.alsa:tst:201934360211"/>
              <criterion comment="mod_ssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800222"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193464" version="638">
      <metadata>
        <title>ALSA-2019:3464: virt-manager security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3464" ref_url="https://errata.almalinux.org/8/ALSA-2019-3464.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3464" ref_url="https://access.redhat.com/errata/RHSA-2019:3464" source="RHSA"/>
        <reference ref_id="CVE-2019-10183" ref_url="https://access.redhat.com/security/cve/CVE-2019-10183" source="CVE"/>
        <description>Virtual Machine Manager (virt-manager) is a graphical tool for administering virtual machines for KVM, Xen, and Linux Containers (LXC). The virt-manager utility uses the libvirt API and can start, stop, add or remove virtualized devices, connect to a graphical or serial console, and view resource usage statistics for existing virtualized guests on local or remote machines. 

The following packages have been upgraded to a later upstream version: virt-manager (2.2.1). (BZ#1727881)

Security Fix(es):

* virt-install: unattended option leaks password via command line argument (CVE-2019-10183)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10183" impact="low" public="20190702">CVE-2019-10183</cve>
          <bugzilla href="https://bugzilla.redhat.com/1726232" id="1726232">CVE-2019-10183 virt-install: unattended option leaks password via command line argument</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="virt-install is earlier than 0:2.2.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193464001"/>
              <criterion comment="virt-install is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193464002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-manager is earlier than 0:2.2.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193464003"/>
              <criterion comment="virt-manager is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193464004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="virt-manager-common is earlier than 0:2.2.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193464005"/>
              <criterion comment="virt-manager-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193464006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193467" version="637">
      <metadata>
        <title>ALSA-2019:3467: dovecot security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3467" ref_url="https://errata.almalinux.org/8/ALSA-2019-3467.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3467" ref_url="https://access.redhat.com/errata/RHSA-2019:3467" source="RHSA"/>
        <reference ref_id="CVE-2019-3814" ref_url="https://access.redhat.com/security/cve/CVE-2019-3814" source="CVE"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: Improper certificate validation (CVE-2019-3814)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-3814" impact="moderate" public="20190205">CVE-2019-3814</cve>
          <bugzilla href="https://bugzilla.redhat.com/1673415" id="1673415">CVE-2019-3814 dovecot: Improper certificate validation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dovecot is earlier than 1:2.2.36-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193467001"/>
              <criterion comment="dovecot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-devel is earlier than 1:2.2.36-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193467003"/>
              <criterion comment="dovecot-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-mysql is earlier than 1:2.2.36-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193467005"/>
              <criterion comment="dovecot-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pgsql is earlier than 1:2.2.36-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193467007"/>
              <criterion comment="dovecot-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pigeonhole is earlier than 1:2.2.36-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193467009"/>
              <criterion comment="dovecot-pigeonhole is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193467010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193476" version="638">
      <metadata>
        <title>ALSA-2019:3476: squid:4 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3476" ref_url="https://errata.almalinux.org/8/ALSA-2019-3476.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3476" ref_url="https://access.redhat.com/errata/RHSA-2019:3476" source="RHSA"/>
        <reference ref_id="CVE-2019-13345" ref_url="https://access.redhat.com/security/cve/CVE-2019-13345" source="CVE"/>
        <description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-13345" impact="moderate" public="20190705">CVE-2019-13345</cve>
          <bugzilla href="https://bugzilla.redhat.com/1727744" id="1727744">CVE-2019-13345 squid: XSS via user_name or auth parameter in cachemgr.cgi</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module squid:4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192593007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760011"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760012"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760031"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760032"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.2.0+319+d18e041f.1" test_ref="oval:org.almalinux.alsa:tst:201934760051"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.3.0+623+2bb85980.2" test_ref="oval:org.almalinux.alsa:tst:201934760052"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193494" version="639">
      <metadata>
        <title>ALSA-2019:3494: container-tools:1.0 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3494" ref_url="https://errata.almalinux.org/8/ALSA-2019-3494.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3494" ref_url="https://access.redhat.com/errata/RHSA-2019:3494" source="RHSA"/>
        <reference ref_id="CVE-2019-10214" ref_url="https://access.redhat.com/security/cve/CVE-2019-10214" source="CVE"/>
        <reference ref_id="CVE-2019-14378" ref_url="https://access.redhat.com/security/cve/CVE-2019-14378" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)

* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-10214" impact="moderate" public="20190909">CVE-2019-10214</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14378" impact="important" public="20190728">CVE-2019-14378</cve>
          <bugzilla href="https://bugzilla.redhat.com/1732508" id="1732508">CVE-2019-10214 containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1734745" id="1734745">CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:1.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193494025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.5-5.gite94b4f9.module+el8.1.0+4241+a7060183" test_ref="oval:org.almalinux.alsa:tst:20193494001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.94-1.git1e99f1d.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:201934940031"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-3.git9ebe139.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:201934940051"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183" test_ref="oval:org.almalinux.alsa:tst:20193494007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940091"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940092"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940093"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940111"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940112"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940113"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940131"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940132"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940133"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183" test_ref="oval:org.almalinux.alsa:tst:20193494015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183" test_ref="oval:org.almalinux.alsa:tst:20193494017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-55.rc5.dev.git2abd837.module_el8.0.0+57+bb81156c" test_ref="oval:org.almalinux.alsa:tst:201934940191"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183" test_ref="oval:org.almalinux.alsa:tst:20193494021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48" test_ref="oval:org.almalinux.alsa:tst:20193494023"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193497" version="636">
      <metadata>
        <title>ALSA-2019:3497: http-parser security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3497" ref_url="https://errata.almalinux.org/8/ALSA-2019-3497.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3497" ref_url="https://access.redhat.com/errata/RHSA-2019:3497" source="RHSA"/>
        <reference ref_id="CVE-2018-12121" ref_url="https://access.redhat.com/security/cve/CVE-2018-12121" source="CVE"/>
        <description>The http-parser package provides a utility for parsing HTTP messages. It parses both requests and responses. The parser is designed to be used in performance HTTP applications. It does not make any system calls or allocations, it does not buffer data, and it can be interrupted at any time. Depending on your architecture, it only requires about 40 bytes of data per message stream.

Security Fix(es):

* nodejs: Denial of Service with large HTTP headers (CVE-2018-12121)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-12121" impact="moderate" public="20181127">CVE-2018-12121</cve>
          <bugzilla href="https://bugzilla.redhat.com/1661002" id="1661002">CVE-2018-12121 nodejs: Denial of Service with large HTTP headers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="http-parser is earlier than 0:2.8.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193497001"/>
          <criterion comment="http-parser is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193497002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193513" version="636">
      <metadata>
        <title>ALSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3513" ref_url="https://errata.almalinux.org/8/ALSA-2019-3513.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3513" ref_url="https://access.redhat.com/errata/RHSA-2019:3513" source="RHSA"/>
        <reference ref_id="CVE-2016-10739" ref_url="https://access.redhat.com/security/cve/CVE-2016-10739" source="CVE"/>
        <description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* glibc: getaddrinfo should reject IP addresses with trailing characters (CVE-2016-10739)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2016-10739" impact="moderate" public="20160428">CVE-2016-10739</cve>
          <bugzilla href="https://bugzilla.redhat.com/1347549" id="1347549">CVE-2016-10739 glibc: getaddrinfo should reject IP addresses with trailing characters</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="compat-libpthread-nonshared is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513001"/>
              <criterion comment="compat-libpthread-nonshared is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513003"/>
              <criterion comment="glibc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-all-langpacks is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513005"/>
              <criterion comment="glibc-all-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-benchtests is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513007"/>
              <criterion comment="glibc-benchtests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-common is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513009"/>
              <criterion comment="glibc-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-devel is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513011"/>
              <criterion comment="glibc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-headers is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513013"/>
              <criterion comment="glibc-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-aa is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513015"/>
              <criterion comment="glibc-langpack-aa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-af is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513017"/>
              <criterion comment="glibc-langpack-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-agr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513019"/>
              <criterion comment="glibc-langpack-agr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ak is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513021"/>
              <criterion comment="glibc-langpack-ak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-am is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513023"/>
              <criterion comment="glibc-langpack-am is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-an is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513025"/>
              <criterion comment="glibc-langpack-an is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-anp is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513027"/>
              <criterion comment="glibc-langpack-anp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ar is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513029"/>
              <criterion comment="glibc-langpack-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-as is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513031"/>
              <criterion comment="glibc-langpack-as is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ast is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513033"/>
              <criterion comment="glibc-langpack-ast is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ayc is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513035"/>
              <criterion comment="glibc-langpack-ayc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-az is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513037"/>
              <criterion comment="glibc-langpack-az is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-be is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513039"/>
              <criterion comment="glibc-langpack-be is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bem is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513041"/>
              <criterion comment="glibc-langpack-bem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ber is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513043"/>
              <criterion comment="glibc-langpack-ber is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bg is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513045"/>
              <criterion comment="glibc-langpack-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bhb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513047"/>
              <criterion comment="glibc-langpack-bhb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bho is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513049"/>
              <criterion comment="glibc-langpack-bho is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513051"/>
              <criterion comment="glibc-langpack-bi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513053"/>
              <criterion comment="glibc-langpack-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513055"/>
              <criterion comment="glibc-langpack-bo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-br is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513057"/>
              <criterion comment="glibc-langpack-br is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-brx is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513059"/>
              <criterion comment="glibc-langpack-brx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bs is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513061"/>
              <criterion comment="glibc-langpack-bs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-byn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513063"/>
              <criterion comment="glibc-langpack-byn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ca is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513065"/>
              <criterion comment="glibc-langpack-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ce is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513067"/>
              <criterion comment="glibc-langpack-ce is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-chr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513069"/>
              <criterion comment="glibc-langpack-chr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cmn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513071"/>
              <criterion comment="glibc-langpack-cmn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-crh is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513073"/>
              <criterion comment="glibc-langpack-crh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cs is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513075"/>
              <criterion comment="glibc-langpack-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-csb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513077"/>
              <criterion comment="glibc-langpack-csb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cv is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513079"/>
              <criterion comment="glibc-langpack-cv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cy is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513081"/>
              <criterion comment="glibc-langpack-cy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-da is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513083"/>
              <criterion comment="glibc-langpack-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-de is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513085"/>
              <criterion comment="glibc-langpack-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-doi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513087"/>
              <criterion comment="glibc-langpack-doi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dsb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513089"/>
              <criterion comment="glibc-langpack-dsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dv is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513091"/>
              <criterion comment="glibc-langpack-dv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dz is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513093"/>
              <criterion comment="glibc-langpack-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-el is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513095"/>
              <criterion comment="glibc-langpack-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-en is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513097"/>
              <criterion comment="glibc-langpack-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513099"/>
              <criterion comment="glibc-langpack-eo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-es is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513101"/>
              <criterion comment="glibc-langpack-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-et is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513103"/>
              <criterion comment="glibc-langpack-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513105"/>
              <criterion comment="glibc-langpack-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fa is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513107"/>
              <criterion comment="glibc-langpack-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ff is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513109"/>
              <criterion comment="glibc-langpack-ff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513111"/>
              <criterion comment="glibc-langpack-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fil is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513113"/>
              <criterion comment="glibc-langpack-fil is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513115"/>
              <criterion comment="glibc-langpack-fo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513117"/>
              <criterion comment="glibc-langpack-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fur is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513119"/>
              <criterion comment="glibc-langpack-fur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fy is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513121"/>
              <criterion comment="glibc-langpack-fy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ga is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513123"/>
              <criterion comment="glibc-langpack-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gd is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513125"/>
              <criterion comment="glibc-langpack-gd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gez is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513127"/>
              <criterion comment="glibc-langpack-gez is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513129"/>
              <criterion comment="glibc-langpack-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513131"/>
              <criterion comment="glibc-langpack-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gv is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513133"/>
              <criterion comment="glibc-langpack-gv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ha is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513135"/>
              <criterion comment="glibc-langpack-ha is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hak is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513137"/>
              <criterion comment="glibc-langpack-hak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-he is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513139"/>
              <criterion comment="glibc-langpack-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513141"/>
              <criterion comment="glibc-langpack-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hif is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513143"/>
              <criterion comment="glibc-langpack-hif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hne is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513145"/>
              <criterion comment="glibc-langpack-hne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513147"/>
              <criterion comment="glibc-langpack-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hsb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513149"/>
              <criterion comment="glibc-langpack-hsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ht is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513151"/>
              <criterion comment="glibc-langpack-ht is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513153"/>
              <criterion comment="glibc-langpack-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hy is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513155"/>
              <criterion comment="glibc-langpack-hy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ia is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513157"/>
              <criterion comment="glibc-langpack-ia is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-id is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513159"/>
              <criterion comment="glibc-langpack-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ig is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513161"/>
              <criterion comment="glibc-langpack-ig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ik is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513163"/>
              <criterion comment="glibc-langpack-ik is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-is is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513165"/>
              <criterion comment="glibc-langpack-is is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-it is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513167"/>
              <criterion comment="glibc-langpack-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-iu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513169"/>
              <criterion comment="glibc-langpack-iu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ja is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513171"/>
              <criterion comment="glibc-langpack-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ka is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513173"/>
              <criterion comment="glibc-langpack-ka is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kab is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513175"/>
              <criterion comment="glibc-langpack-kab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kk is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513177"/>
              <criterion comment="glibc-langpack-kk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513179"/>
              <criterion comment="glibc-langpack-kl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-km is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513181"/>
              <criterion comment="glibc-langpack-km is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513183"/>
              <criterion comment="glibc-langpack-kn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ko is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513185"/>
              <criterion comment="glibc-langpack-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kok is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513187"/>
              <criterion comment="glibc-langpack-kok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ks is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513189"/>
              <criterion comment="glibc-langpack-ks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ku is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513191"/>
              <criterion comment="glibc-langpack-ku is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kw is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513193"/>
              <criterion comment="glibc-langpack-kw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ky is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513195"/>
              <criterion comment="glibc-langpack-ky is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513197"/>
              <criterion comment="glibc-langpack-lb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lg is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513199"/>
              <criterion comment="glibc-langpack-lg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-li is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513201"/>
              <criterion comment="glibc-langpack-li is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lij is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513203"/>
              <criterion comment="glibc-langpack-lij is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ln is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513205"/>
              <criterion comment="glibc-langpack-ln is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513207"/>
              <criterion comment="glibc-langpack-lo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lt is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513209"/>
              <criterion comment="glibc-langpack-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lv is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513211"/>
              <criterion comment="glibc-langpack-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lzh is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513213"/>
              <criterion comment="glibc-langpack-lzh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513214"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mag is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513215"/>
              <criterion comment="glibc-langpack-mag is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513216"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mai is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513217"/>
              <criterion comment="glibc-langpack-mai is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513218"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mfe is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513219"/>
              <criterion comment="glibc-langpack-mfe is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513220"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mg is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513221"/>
              <criterion comment="glibc-langpack-mg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mhr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513223"/>
              <criterion comment="glibc-langpack-mhr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513224"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513225"/>
              <criterion comment="glibc-langpack-mi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513226"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-miq is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513227"/>
              <criterion comment="glibc-langpack-miq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513228"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mjw is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513229"/>
              <criterion comment="glibc-langpack-mjw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513230"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mk is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513231"/>
              <criterion comment="glibc-langpack-mk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513232"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ml is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513233"/>
              <criterion comment="glibc-langpack-ml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513234"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513235"/>
              <criterion comment="glibc-langpack-mn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513236"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mni is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513237"/>
              <criterion comment="glibc-langpack-mni is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513238"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513239"/>
              <criterion comment="glibc-langpack-mr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513240"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ms is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513241"/>
              <criterion comment="glibc-langpack-ms is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mt is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513243"/>
              <criterion comment="glibc-langpack-mt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513244"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-my is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513245"/>
              <criterion comment="glibc-langpack-my is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513246"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nan is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513247"/>
              <criterion comment="glibc-langpack-nan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513248"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nb is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513249"/>
              <criterion comment="glibc-langpack-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513250"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nds is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513251"/>
              <criterion comment="glibc-langpack-nds is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513252"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ne is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513253"/>
              <criterion comment="glibc-langpack-ne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513254"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nhn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513255"/>
              <criterion comment="glibc-langpack-nhn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513256"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-niu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513257"/>
              <criterion comment="glibc-langpack-niu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513258"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513259"/>
              <criterion comment="glibc-langpack-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513260"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513261"/>
              <criterion comment="glibc-langpack-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513263"/>
              <criterion comment="glibc-langpack-nr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513264"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nso is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513265"/>
              <criterion comment="glibc-langpack-nso is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513266"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-oc is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513267"/>
              <criterion comment="glibc-langpack-oc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513268"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-om is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513269"/>
              <criterion comment="glibc-langpack-om is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513270"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-or is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513271"/>
              <criterion comment="glibc-langpack-or is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513272"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-os is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513273"/>
              <criterion comment="glibc-langpack-os is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513274"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pa is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513275"/>
              <criterion comment="glibc-langpack-pa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513276"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pap is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513277"/>
              <criterion comment="glibc-langpack-pap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513278"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513279"/>
              <criterion comment="glibc-langpack-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513280"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ps is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513281"/>
              <criterion comment="glibc-langpack-ps is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pt is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513283"/>
              <criterion comment="glibc-langpack-pt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513284"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-quz is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513285"/>
              <criterion comment="glibc-langpack-quz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513286"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-raj is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513287"/>
              <criterion comment="glibc-langpack-raj is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513288"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ro is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513289"/>
              <criterion comment="glibc-langpack-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513290"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ru is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513291"/>
              <criterion comment="glibc-langpack-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513292"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-rw is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513293"/>
              <criterion comment="glibc-langpack-rw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513294"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sa is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513295"/>
              <criterion comment="glibc-langpack-sa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513296"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sah is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513297"/>
              <criterion comment="glibc-langpack-sah is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513298"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sat is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513299"/>
              <criterion comment="glibc-langpack-sat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513300"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sc is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513301"/>
              <criterion comment="glibc-langpack-sc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sd is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513303"/>
              <criterion comment="glibc-langpack-sd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513304"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-se is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513305"/>
              <criterion comment="glibc-langpack-se is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513306"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sgs is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513307"/>
              <criterion comment="glibc-langpack-sgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513308"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513309"/>
              <criterion comment="glibc-langpack-shn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513310"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shs is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513311"/>
              <criterion comment="glibc-langpack-shs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513312"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-si is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513313"/>
              <criterion comment="glibc-langpack-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513314"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sid is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513315"/>
              <criterion comment="glibc-langpack-sid is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513316"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sk is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513317"/>
              <criterion comment="glibc-langpack-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513318"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513319"/>
              <criterion comment="glibc-langpack-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513320"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sm is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513321"/>
              <criterion comment="glibc-langpack-sm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-so is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513323"/>
              <criterion comment="glibc-langpack-so is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513324"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sq is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513325"/>
              <criterion comment="glibc-langpack-sq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513326"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513327"/>
              <criterion comment="glibc-langpack-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513328"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ss is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513329"/>
              <criterion comment="glibc-langpack-ss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513330"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-st is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513331"/>
              <criterion comment="glibc-langpack-st is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513332"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sv is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513333"/>
              <criterion comment="glibc-langpack-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513334"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sw is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513335"/>
              <criterion comment="glibc-langpack-sw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513336"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-szl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513337"/>
              <criterion comment="glibc-langpack-szl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513338"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ta is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513339"/>
              <criterion comment="glibc-langpack-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513340"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tcy is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513341"/>
              <criterion comment="glibc-langpack-tcy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-te is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513343"/>
              <criterion comment="glibc-langpack-te is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513344"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tg is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513345"/>
              <criterion comment="glibc-langpack-tg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513346"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-th is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513347"/>
              <criterion comment="glibc-langpack-th is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513348"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-the is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513349"/>
              <criterion comment="glibc-langpack-the is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513350"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ti is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513351"/>
              <criterion comment="glibc-langpack-ti is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513352"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tig is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513353"/>
              <criterion comment="glibc-langpack-tig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513354"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tk is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513355"/>
              <criterion comment="glibc-langpack-tk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513356"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513357"/>
              <criterion comment="glibc-langpack-tl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513358"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tn is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513359"/>
              <criterion comment="glibc-langpack-tn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513360"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-to is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513361"/>
              <criterion comment="glibc-langpack-to is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tpi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513363"/>
              <criterion comment="glibc-langpack-tpi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513364"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tr is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513365"/>
              <criterion comment="glibc-langpack-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513366"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ts is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513367"/>
              <criterion comment="glibc-langpack-ts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513368"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tt is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513369"/>
              <criterion comment="glibc-langpack-tt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513370"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ug is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513371"/>
              <criterion comment="glibc-langpack-ug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513372"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uk is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513373"/>
              <criterion comment="glibc-langpack-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513374"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-unm is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513375"/>
              <criterion comment="glibc-langpack-unm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513376"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ur is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513377"/>
              <criterion comment="glibc-langpack-ur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513378"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uz is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513379"/>
              <criterion comment="glibc-langpack-uz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513380"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ve is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513381"/>
              <criterion comment="glibc-langpack-ve is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513382"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-vi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513383"/>
              <criterion comment="glibc-langpack-vi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513384"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wa is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513385"/>
              <criterion comment="glibc-langpack-wa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513386"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wae is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513387"/>
              <criterion comment="glibc-langpack-wae is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513388"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wal is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513389"/>
              <criterion comment="glibc-langpack-wal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513390"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513391"/>
              <criterion comment="glibc-langpack-wo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513392"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-xh is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513393"/>
              <criterion comment="glibc-langpack-xh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513394"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yi is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513395"/>
              <criterion comment="glibc-langpack-yi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513396"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yo is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513397"/>
              <criterion comment="glibc-langpack-yo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513398"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yue is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513399"/>
              <criterion comment="glibc-langpack-yue is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513400"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yuw is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513401"/>
              <criterion comment="glibc-langpack-yuw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zh is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513403"/>
              <criterion comment="glibc-langpack-zh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513404"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zu is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513405"/>
              <criterion comment="glibc-langpack-zu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513406"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-locale-source is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513407"/>
              <criterion comment="glibc-locale-source is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513408"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-minimal-langpack is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513409"/>
              <criterion comment="glibc-minimal-langpack is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513410"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-nss-devel is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513411"/>
              <criterion comment="glibc-nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513412"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-static is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513413"/>
              <criterion comment="glibc-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513414"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-utils is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513415"/>
              <criterion comment="glibc-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513416"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libnsl is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513417"/>
              <criterion comment="libnsl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513418"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nscd is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513419"/>
              <criterion comment="nscd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513420"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_db is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513421"/>
              <criterion comment="nss_db is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513422"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_hesiod is earlier than 0:2.28-72.el8" test_ref="oval:org.almalinux.alsa:tst:20193513423"/>
              <criterion comment="nss_hesiod is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513424"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193517" version="638">
      <metadata>
        <title>ALSA-2019:3517: kernel security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3517" ref_url="https://errata.almalinux.org/8/ALSA-2019-3517.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3517" ref_url="https://access.redhat.com/errata/RHSA-2019:3517" source="RHSA"/>
        <reference ref_id="CVE-2015-1593" ref_url="https://access.redhat.com/security/cve/CVE-2015-1593" source="CVE"/>
        <reference ref_id="CVE-2018-16884" ref_url="https://access.redhat.com/security/cve/CVE-2018-16884" source="CVE"/>
        <reference ref_id="CVE-2018-19854" ref_url="https://access.redhat.com/security/cve/CVE-2018-19854" source="CVE"/>
        <reference ref_id="CVE-2018-19985" ref_url="https://access.redhat.com/security/cve/CVE-2018-19985" source="CVE"/>
        <reference ref_id="CVE-2018-20169" ref_url="https://access.redhat.com/security/cve/CVE-2018-20169" source="CVE"/>
        <reference ref_id="CVE-2019-10126" ref_url="https://access.redhat.com/security/cve/CVE-2019-10126" source="CVE"/>
        <reference ref_id="CVE-2019-10207" ref_url="https://access.redhat.com/security/cve/CVE-2019-10207" source="CVE"/>
        <reference ref_id="CVE-2019-10638" ref_url="https://access.redhat.com/security/cve/CVE-2019-10638" source="CVE"/>
        <reference ref_id="CVE-2019-11599" ref_url="https://access.redhat.com/security/cve/CVE-2019-11599" source="CVE"/>
        <reference ref_id="CVE-2019-11833" ref_url="https://access.redhat.com/security/cve/CVE-2019-11833" source="CVE"/>
        <reference ref_id="CVE-2019-11884" ref_url="https://access.redhat.com/security/cve/CVE-2019-11884" source="CVE"/>
        <reference ref_id="CVE-2019-12382" ref_url="https://access.redhat.com/security/cve/CVE-2019-12382" source="CVE"/>
        <reference ref_id="CVE-2019-13233" ref_url="https://access.redhat.com/security/cve/CVE-2019-13233" source="CVE"/>
        <reference ref_id="CVE-2019-13648" ref_url="https://access.redhat.com/security/cve/CVE-2019-13648" source="CVE"/>
        <reference ref_id="CVE-2019-14821" ref_url="https://access.redhat.com/security/cve/CVE-2019-14821" source="CVE"/>
        <reference ref_id="CVE-2019-15214" ref_url="https://access.redhat.com/security/cve/CVE-2019-15214" source="CVE"/>
        <reference ref_id="CVE-2019-15666" ref_url="https://access.redhat.com/security/cve/CVE-2019-15666" source="CVE"/>
        <reference ref_id="CVE-2019-15916" ref_url="https://access.redhat.com/security/cve/CVE-2019-15916" source="CVE"/>
        <reference ref_id="CVE-2019-15919" ref_url="https://access.redhat.com/security/cve/CVE-2019-15919" source="CVE"/>
        <reference ref_id="CVE-2019-15920" ref_url="https://access.redhat.com/security/cve/CVE-2019-15920" source="CVE"/>
        <reference ref_id="CVE-2019-15921" ref_url="https://access.redhat.com/security/cve/CVE-2019-15921" source="CVE"/>
        <reference ref_id="CVE-2019-15924" ref_url="https://access.redhat.com/security/cve/CVE-2019-15924" source="CVE"/>
        <reference ref_id="CVE-2019-15927" ref_url="https://access.redhat.com/security/cve/CVE-2019-15927" source="CVE"/>
        <reference ref_id="CVE-2019-16994" ref_url="https://access.redhat.com/security/cve/CVE-2019-16994" source="CVE"/>
        <reference ref_id="CVE-2019-20811" ref_url="https://access.redhat.com/security/cve/CVE-2019-20811" source="CVE"/>
        <reference ref_id="CVE-2019-3459" ref_url="https://access.redhat.com/security/cve/CVE-2019-3459" source="CVE"/>
        <reference ref_id="CVE-2019-3460" ref_url="https://access.redhat.com/security/cve/CVE-2019-3460" source="CVE"/>
        <reference ref_id="CVE-2019-3874" ref_url="https://access.redhat.com/security/cve/CVE-2019-3874" source="CVE"/>
        <reference ref_id="CVE-2019-3882" ref_url="https://access.redhat.com/security/cve/CVE-2019-3882" source="CVE"/>
        <reference ref_id="CVE-2019-3900" ref_url="https://access.redhat.com/security/cve/CVE-2019-3900" source="CVE"/>
        <reference ref_id="CVE-2019-5489" ref_url="https://access.redhat.com/security/cve/CVE-2019-5489" source="CVE"/>
        <reference ref_id="CVE-2019-7222" ref_url="https://access.redhat.com/security/cve/CVE-2019-7222" source="CVE"/>
        <reference ref_id="CVE-2019-9506" ref_url="https://access.redhat.com/security/cve/CVE-2019-9506" source="CVE"/>
        <reference ref_id="CVE-2020-10720" ref_url="https://access.redhat.com/security/cve/CVE-2020-10720" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)

* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)

* Kernel: page cache side channel attacks (CVE-2019-5489)

* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)

* kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)

* kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)

* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)

* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)

* kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)

* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)

* kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)

* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)

* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)

* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)

* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)

* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)

* kernel: Linux stack ASLR implementation Integer overflow (CVE-2015-1593)

* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)

* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)

* Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss2="1.9/AV:L/AC:M/Au:N/C:P/I:N/A:N" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2015-1593" impact="low" public="20150213">CVE-2015-1593</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-16884" impact="important" public="20181127">CVE-2018-16884</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-19854" impact="moderate" public="20181103">CVE-2018-19854</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19985" impact="low" public="20181212">CVE-2018-19985</cve>
          <cve cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2018-20169" impact="moderate" public="20181205">CVE-2018-20169</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-10126" impact="important" public="20190531">CVE-2019-10126</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-10207" impact="moderate" public="20190729:1300">CVE-2019-10207</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-331-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10638" impact="low" public="20190715">CVE-2019-10638</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-362-&gt;CWE-667" href="https://access.redhat.com/security/cve/CVE-2019-11599" impact="moderate" public="20190419">CVE-2019-11599</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-456-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11833" impact="moderate" public="20190511">CVE-2019-11833</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11884" impact="moderate" public="20190510">CVE-2019-11884</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-253-&gt;CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-12382" impact="moderate" public="20190524">CVE-2019-12382</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-13233" impact="moderate" public="20190704">CVE-2019-13233</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13648" impact="moderate" public="20190719">CVE-2019-13648</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-14821" impact="important" public="20190917:1700">CVE-2019-14821</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15214" impact="moderate" public="20190819">CVE-2019-15214</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-15666" impact="moderate" public="20190827">CVE-2019-15666</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-15916" impact="moderate" public="20190904">CVE-2019-15916</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15919" impact="moderate" public="20190904">CVE-2019-15919</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15920" impact="moderate" public="20190904">CVE-2019-15920</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://access.redhat.com/security/cve/CVE-2019-15921" impact="low" public="20190904">CVE-2019-15921</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-15924" impact="low" public="20190904">CVE-2019-15924</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-15927" impact="moderate" public="20190904">CVE-2019-15927</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-16994" impact="low" public="20190930">CVE-2019-16994</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-460" href="https://access.redhat.com/security/cve/CVE-2019-20811" impact="low" public="20190319">CVE-2019-20811</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3459" impact="moderate" public="20190111">CVE-2019-3459</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3460" impact="moderate" public="20190111">CVE-2019-3460</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-3874" impact="moderate" public="20190319">CVE-2019-3874</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-3882" impact="moderate" public="20190402">CVE-2019-3882</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-3900" impact="important" public="20190425">CVE-2019-3900</cve>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-5489" impact="important" public="20190106">CVE-2019-5489</cve>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-7222" impact="low" public="20190207">CVE-2019-7222</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2019-9506" impact="important" public="20190810:0900">CVE-2019-9506</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10720" impact="moderate" public="20191209:1423">CVE-2020-10720</cve>
          <bugzilla href="https://bugzilla.redhat.com/1192519" id="1192519">CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1656986" id="1656986">CVE-2018-19854 kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660375" id="1660375">CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660385" id="1660385">CVE-2018-20169 kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663176" id="1663176">CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663179" id="1663179">CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1664110" id="1664110">CVE-2019-5489 Kernel: page cache side channel attacks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666106" id="1666106">CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1671930" id="1671930">CVE-2019-7222 Kernel: KVM: leak of uninitialized stack contents to guest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1686373" id="1686373">CVE-2019-3874 kernel: SCTP socket buffer memory leak leading to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1689426" id="1689426">CVE-2019-3882 kernel: denial of service vector through vfio DMA mappings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1698757" id="1698757">CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1705937" id="1705937">CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709837" id="1709837">CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1712072" id="1712072">CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1715554" id="1715554">CVE-2019-12382 kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1716992" id="1716992">CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1727756" id="1727756">CVE-2019-13233 kernel: use-after-free in arch/x86/lib/insn-eval.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1727857" id="1727857">CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1729931" id="1729931">CVE-2019-10638 Kernel: net: weak IP ID generation leads to remote device tracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1733874" id="1733874">CVE-2019-10207 kernel: null-pointer dereference in hci_uart_set_flow_control</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735630" id="1735630">CVE-2019-13648 kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743591" id="1743591">CVE-2019-15214 kernel: use-after-free in sound/core/init.c and sound/core/info.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1746708" id="1746708">CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1747334" id="1747334">CVE-2019-15666 kernel: out-of-bounds array access in __xfrm_policy_unlink</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1750410" id="1750410">CVE-2019-15919 kernel: use-after-free in SMB2_write function in fs/cifs/smb2pdu.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1750813" id="1750813">CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1759059" id="1759059">CVE-2019-15927 kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1759681" id="1759681">CVE-2019-16994 kernel: Memory leak in sit_init_net() in net/ipv6/sit.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760864" id="1760864">CVE-2019-15920 kernel: use-after-free information leak in SMB2_read</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760958" id="1760958">CVE-2019-15921 kernel: memory leak in genl_register_family() in net/netlink/genetlink.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763869" id="1763869">CVE-2019-15924 kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781204" id="1781204">CVE-2020-10720 kernel: use-after-free read in napi_gro_frags() in the Linux kernel</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846439" id="1846439">CVE-2019-20811 kernel: net-sysfs: *_queue_add_kobject refcount issue</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-147.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193309025"/>
            <criterion comment="kernel earlier than 0:4.18.0-147.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193517052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193517049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193520" version="637">
      <metadata>
        <title>ALSA-2019:3520: python3 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3520" ref_url="https://errata.almalinux.org/8/ALSA-2019-3520.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3520" ref_url="https://access.redhat.com/errata/RHSA-2019:3520" source="RHSA"/>
        <reference ref_id="CVE-2019-5010" ref_url="https://access.redhat.com/security/cve/CVE-2019-5010" source="CVE"/>
        <reference ref_id="CVE-2019-9740" ref_url="https://access.redhat.com/security/cve/CVE-2019-9740" source="CVE"/>
        <reference ref_id="CVE-2019-9947" ref_url="https://access.redhat.com/security/cve/CVE-2019-9947" source="CVE"/>
        <reference ref_id="CVE-2019-9948" ref_url="https://access.redhat.com/security/cve/CVE-2019-9948" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: NULL pointer dereference using a specially crafted X509 certificate (CVE-2019-5010)

* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740)

* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947)

* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-5010" impact="moderate" public="20190115">CVE-2019-5010</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-9740" impact="moderate" public="20190313">CVE-2019-9740</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-9947" impact="moderate" public="20190323">CVE-2019-9947</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-749" href="https://access.redhat.com/security/cve/CVE-2019-9948" impact="moderate" public="20190323">CVE-2019-9948</cve>
          <bugzilla href="https://bugzilla.redhat.com/1666519" id="1666519">CVE-2019-5010 python: NULL pointer dereference using a specially crafted X509 certificate</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688169" id="1688169">CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695570" id="1695570">CVE-2019-9948 python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695572" id="1695572">CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520001"/>
              <criterion comment="platform-python is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-debug is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520003"/>
              <criterion comment="platform-python-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-devel is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520005"/>
              <criterion comment="platform-python-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-idle is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520007"/>
              <criterion comment="python3-idle is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libs is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520009"/>
              <criterion comment="python3-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-test is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520011"/>
              <criterion comment="python3-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-tkinter is earlier than 0:3.6.8-15.1.el8" test_ref="oval:org.almalinux.alsa:tst:20193520013"/>
              <criterion comment="python3-tkinter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193525" version="636">
      <metadata>
        <title>ALSA-2019:3525: dhcp security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3525" ref_url="https://errata.almalinux.org/8/ALSA-2019-3525.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3525" ref_url="https://access.redhat.com/errata/RHSA-2019:3525" source="RHSA"/>
        <reference ref_id="CVE-2019-6470" ref_url="https://access.redhat.com/security/cve/CVE-2019-6470" source="CVE"/>
        <description>The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.

Security Fix(es):

* dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6470" impact="moderate" public="20180714">CVE-2019-6470</cve>
          <bugzilla href="https://bugzilla.redhat.com/1708641" id="1708641">CVE-2019-6470 dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dhcp-client is earlier than 12:4.3.6-34.el8" test_ref="oval:org.almalinux.alsa:tst:20193525001"/>
              <criterion comment="dhcp-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193525002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dhcp-common is earlier than 12:4.3.6-34.el8" test_ref="oval:org.almalinux.alsa:tst:20193525003"/>
              <criterion comment="dhcp-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193525004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dhcp-libs is earlier than 12:4.3.6-34.el8" test_ref="oval:org.almalinux.alsa:tst:20193525005"/>
              <criterion comment="dhcp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193525006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dhcp-relay is earlier than 12:4.3.6-34.el8" test_ref="oval:org.almalinux.alsa:tst:20193525007"/>
              <criterion comment="dhcp-relay is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193525008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dhcp-server is earlier than 12:4.3.6-34.el8" test_ref="oval:org.almalinux.alsa:tst:20193525009"/>
              <criterion comment="dhcp-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193525010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193530" version="638">
      <metadata>
        <title>ALSA-2019:3530: glib2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3530" ref_url="https://errata.almalinux.org/8/ALSA-2019-3530.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3530" ref_url="https://access.redhat.com/errata/RHSA-2019:3530" source="RHSA"/>
        <reference ref_id="CVE-2019-12450" ref_url="https://access.redhat.com/security/cve/CVE-2019-12450" source="CVE"/>
        <description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

* glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-552" href="https://access.redhat.com/security/cve/CVE-2019-12450" impact="moderate" public="20190523">CVE-2019-12450</cve>
          <bugzilla href="https://bugzilla.redhat.com/1719141" id="1719141">CVE-2019-12450 glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="glib2 is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530001"/>
              <criterion comment="glib2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-devel is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530003"/>
              <criterion comment="glib2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-doc is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530005"/>
              <criterion comment="glib2-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-fam is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530007"/>
              <criterion comment="glib2-fam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-static is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530009"/>
              <criterion comment="glib2-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-tests is earlier than 0:2.56.4-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193530011"/>
              <criterion comment="glib2-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193552" version="636">
      <metadata>
        <title>ALSA-2019:3552: bind security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3552" ref_url="https://errata.almalinux.org/8/ALSA-2019-3552.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3552" ref_url="https://access.redhat.com/errata/RHSA-2019:3552" source="RHSA"/>
        <reference ref_id="CVE-2018-5745" ref_url="https://access.redhat.com/security/cve/CVE-2018-5745" source="CVE"/>
        <reference ref_id="CVE-2019-6465" ref_url="https://access.redhat.com/security/cve/CVE-2019-6465" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (CVE-2018-5745)

* bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable (CVE-2019-6465)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-5745" impact="low" public="20190221">CVE-2018-5745</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-6465" impact="low" public="20190221">CVE-2019-6465</cve>
          <bugzilla href="https://bugzilla.redhat.com/1679303" id="1679303">CVE-2018-5745 bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1679304" id="1679304">CVE-2019-6465 bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.4-26.P2.el8" test_ref="oval:org.almalinux.alsa:tst:20193552033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193553" version="640">
      <metadata>
        <title>ALSA-2019:3553: GNOME security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3553" ref_url="https://errata.almalinux.org/8/ALSA-2019-3553.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3553" ref_url="https://access.redhat.com/errata/RHSA-2019:3553" source="RHSA"/>
        <reference ref_id="CVE-2019-11070" ref_url="https://access.redhat.com/security/cve/CVE-2019-11070" source="CVE"/>
        <reference ref_id="CVE-2019-11459" ref_url="https://access.redhat.com/security/cve/CVE-2019-11459" source="CVE"/>
        <reference ref_id="CVE-2019-12795" ref_url="https://access.redhat.com/security/cve/CVE-2019-12795" source="CVE"/>
        <reference ref_id="CVE-2019-3820" ref_url="https://access.redhat.com/security/cve/CVE-2019-3820" source="CVE"/>
        <reference ref_id="CVE-2019-6237" ref_url="https://access.redhat.com/security/cve/CVE-2019-6237" source="CVE"/>
        <reference ref_id="CVE-2019-6251" ref_url="https://access.redhat.com/security/cve/CVE-2019-6251" source="CVE"/>
        <reference ref_id="CVE-2019-8506" ref_url="https://access.redhat.com/security/cve/CVE-2019-8506" source="CVE"/>
        <reference ref_id="CVE-2019-8518" ref_url="https://access.redhat.com/security/cve/CVE-2019-8518" source="CVE"/>
        <reference ref_id="CVE-2019-8523" ref_url="https://access.redhat.com/security/cve/CVE-2019-8523" source="CVE"/>
        <reference ref_id="CVE-2019-8524" ref_url="https://access.redhat.com/security/cve/CVE-2019-8524" source="CVE"/>
        <reference ref_id="CVE-2019-8535" ref_url="https://access.redhat.com/security/cve/CVE-2019-8535" source="CVE"/>
        <reference ref_id="CVE-2019-8536" ref_url="https://access.redhat.com/security/cve/CVE-2019-8536" source="CVE"/>
        <reference ref_id="CVE-2019-8544" ref_url="https://access.redhat.com/security/cve/CVE-2019-8544" source="CVE"/>
        <reference ref_id="CVE-2019-8551" ref_url="https://access.redhat.com/security/cve/CVE-2019-8551" source="CVE"/>
        <reference ref_id="CVE-2019-8558" ref_url="https://access.redhat.com/security/cve/CVE-2019-8558" source="CVE"/>
        <reference ref_id="CVE-2019-8559" ref_url="https://access.redhat.com/security/cve/CVE-2019-8559" source="CVE"/>
        <reference ref_id="CVE-2019-8563" ref_url="https://access.redhat.com/security/cve/CVE-2019-8563" source="CVE"/>
        <reference ref_id="CVE-2019-8571" ref_url="https://access.redhat.com/security/cve/CVE-2019-8571" source="CVE"/>
        <reference ref_id="CVE-2019-8583" ref_url="https://access.redhat.com/security/cve/CVE-2019-8583" source="CVE"/>
        <reference ref_id="CVE-2019-8584" ref_url="https://access.redhat.com/security/cve/CVE-2019-8584" source="CVE"/>
        <reference ref_id="CVE-2019-8586" ref_url="https://access.redhat.com/security/cve/CVE-2019-8586" source="CVE"/>
        <reference ref_id="CVE-2019-8587" ref_url="https://access.redhat.com/security/cve/CVE-2019-8587" source="CVE"/>
        <reference ref_id="CVE-2019-8594" ref_url="https://access.redhat.com/security/cve/CVE-2019-8594" source="CVE"/>
        <reference ref_id="CVE-2019-8595" ref_url="https://access.redhat.com/security/cve/CVE-2019-8595" source="CVE"/>
        <reference ref_id="CVE-2019-8596" ref_url="https://access.redhat.com/security/cve/CVE-2019-8596" source="CVE"/>
        <reference ref_id="CVE-2019-8597" ref_url="https://access.redhat.com/security/cve/CVE-2019-8597" source="CVE"/>
        <reference ref_id="CVE-2019-8601" ref_url="https://access.redhat.com/security/cve/CVE-2019-8601" source="CVE"/>
        <reference ref_id="CVE-2019-8607" ref_url="https://access.redhat.com/security/cve/CVE-2019-8607" source="CVE"/>
        <reference ref_id="CVE-2019-8608" ref_url="https://access.redhat.com/security/cve/CVE-2019-8608" source="CVE"/>
        <reference ref_id="CVE-2019-8609" ref_url="https://access.redhat.com/security/cve/CVE-2019-8609" source="CVE"/>
        <reference ref_id="CVE-2019-8610" ref_url="https://access.redhat.com/security/cve/CVE-2019-8610" source="CVE"/>
        <reference ref_id="CVE-2019-8611" ref_url="https://access.redhat.com/security/cve/CVE-2019-8611" source="CVE"/>
        <reference ref_id="CVE-2019-8615" ref_url="https://access.redhat.com/security/cve/CVE-2019-8615" source="CVE"/>
        <reference ref_id="CVE-2019-8619" ref_url="https://access.redhat.com/security/cve/CVE-2019-8619" source="CVE"/>
        <reference ref_id="CVE-2019-8622" ref_url="https://access.redhat.com/security/cve/CVE-2019-8622" source="CVE"/>
        <reference ref_id="CVE-2019-8623" ref_url="https://access.redhat.com/security/cve/CVE-2019-8623" source="CVE"/>
        <reference ref_id="CVE-2019-8666" ref_url="https://access.redhat.com/security/cve/CVE-2019-8666" source="CVE"/>
        <reference ref_id="CVE-2019-8671" ref_url="https://access.redhat.com/security/cve/CVE-2019-8671" source="CVE"/>
        <reference ref_id="CVE-2019-8672" ref_url="https://access.redhat.com/security/cve/CVE-2019-8672" source="CVE"/>
        <reference ref_id="CVE-2019-8673" ref_url="https://access.redhat.com/security/cve/CVE-2019-8673" source="CVE"/>
        <reference ref_id="CVE-2019-8676" ref_url="https://access.redhat.com/security/cve/CVE-2019-8676" source="CVE"/>
        <reference ref_id="CVE-2019-8677" ref_url="https://access.redhat.com/security/cve/CVE-2019-8677" source="CVE"/>
        <reference ref_id="CVE-2019-8679" ref_url="https://access.redhat.com/security/cve/CVE-2019-8679" source="CVE"/>
        <reference ref_id="CVE-2019-8681" ref_url="https://access.redhat.com/security/cve/CVE-2019-8681" source="CVE"/>
        <reference ref_id="CVE-2019-8686" ref_url="https://access.redhat.com/security/cve/CVE-2019-8686" source="CVE"/>
        <reference ref_id="CVE-2019-8687" ref_url="https://access.redhat.com/security/cve/CVE-2019-8687" source="CVE"/>
        <reference ref_id="CVE-2019-8689" ref_url="https://access.redhat.com/security/cve/CVE-2019-8689" source="CVE"/>
        <reference ref_id="CVE-2019-8690" ref_url="https://access.redhat.com/security/cve/CVE-2019-8690" source="CVE"/>
        <reference ref_id="CVE-2019-8726" ref_url="https://access.redhat.com/security/cve/CVE-2019-8726" source="CVE"/>
        <reference ref_id="CVE-2019-8735" ref_url="https://access.redhat.com/security/cve/CVE-2019-8735" source="CVE"/>
        <reference ref_id="CVE-2019-8768" ref_url="https://access.redhat.com/security/cve/CVE-2019-8768" source="CVE"/>
        <description>GNOME is the default desktop environment of AlmaLinux.

Security Fix(es):

* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)

* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-11070" impact="moderate" public="20190410">CVE-2019-11070</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11459" impact="low" public="20190413">CVE-2019-11459</cve>
          <cve cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-12795" impact="low" public="20190605">CVE-2019-12795</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-3820" impact="moderate" public="20190205:1200">CVE-2019-3820</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-6237" impact="moderate" public="20190520">CVE-2019-6237</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6251" impact="moderate" public="20180911">CVE-2019-6251</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8506" impact="moderate" public="20190410">CVE-2019-8506</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8518" impact="moderate" public="20190410">CVE-2019-8518</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8523" impact="moderate" public="20190410">CVE-2019-8523</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8524" impact="moderate" public="20190410">CVE-2019-8524</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8535" impact="moderate" public="20190410">CVE-2019-8535</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8536" impact="moderate" public="20190410">CVE-2019-8536</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8544" impact="moderate" public="20190410">CVE-2019-8544</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-8551" impact="moderate" public="20190410">CVE-2019-8551</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8558" impact="moderate" public="20190410">CVE-2019-8558</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8559" impact="moderate" public="20190410">CVE-2019-8559</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-8563" impact="moderate" public="20190410">CVE-2019-8563</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8571" impact="moderate" public="20190520">CVE-2019-8571</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8583" impact="moderate" public="20190520">CVE-2019-8583</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8584" impact="moderate" public="20190520">CVE-2019-8584</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8586" impact="moderate" public="20190520">CVE-2019-8586</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8587" impact="moderate" public="20190520">CVE-2019-8587</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8594" impact="moderate" public="20190520">CVE-2019-8594</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8595" impact="moderate" public="20190520">CVE-2019-8595</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8596" impact="moderate" public="20190520">CVE-2019-8596</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8597" impact="moderate" public="20190520">CVE-2019-8597</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8601" impact="moderate" public="20190520">CVE-2019-8601</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8607" impact="moderate" public="20190520">CVE-2019-8607</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8608" impact="moderate" public="20190520">CVE-2019-8608</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8609" impact="moderate" public="20190520">CVE-2019-8609</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8610" impact="moderate" public="20190520">CVE-2019-8610</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8611" impact="moderate" public="20190520">CVE-2019-8611</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8615" impact="moderate" public="20190520">CVE-2019-8615</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8619" impact="moderate" public="20190520">CVE-2019-8619</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8622" impact="moderate" public="20190520">CVE-2019-8622</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8623" impact="moderate" public="20190520">CVE-2019-8623</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8666" impact="moderate" public="20190829">CVE-2019-8666</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8671" impact="moderate" public="20190829">CVE-2019-8671</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8672" impact="moderate" public="20190829">CVE-2019-8672</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8673" impact="moderate" public="20190829">CVE-2019-8673</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8676" impact="moderate" public="20190829">CVE-2019-8676</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8677" impact="moderate" public="20190829">CVE-2019-8677</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8679" impact="moderate" public="20190829">CVE-2019-8679</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8681" impact="moderate" public="20190829">CVE-2019-8681</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8686" impact="moderate" public="20190829">CVE-2019-8686</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8687" impact="moderate" public="20190829">CVE-2019-8687</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8689" impact="moderate" public="20190829">CVE-2019-8689</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8690" impact="moderate" public="20190829">CVE-2019-8690</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8726" impact="moderate" public="20191029">CVE-2019-8726</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8735" impact="moderate" public="20191029">CVE-2019-8735</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8768" impact="low" public="20191029">CVE-2019-8768</cve>
          <bugzilla href="https://bugzilla.redhat.com/1667409" id="1667409">CVE-2019-6251 webkitgtk: processing maliciously crafted web content lead to URI spoofing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1669391" id="1669391">CVE-2019-3820 gnome-shell: partial lock screen bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1709289" id="1709289">CVE-2019-11070 webkitgtk: HTTP proxy setting deanonymization information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1716295" id="1716295">CVE-2019-11459 evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719199" id="1719199">CVE-2019-8506 webkitgtk: malicous web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719206" id="1719206">CVE-2019-8518 webkitgtk: malicious web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719208" id="1719208">CVE-2019-8523 webkitgtk: malicious web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719209" id="1719209">CVE-2019-8524 webkitgtk: malicious web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719210" id="1719210">CVE-2019-8535 webkitgtk: malicious crafted web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719213" id="1719213">CVE-2019-8536 webkitgtk: malicious crafted web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719224" id="1719224">CVE-2019-8544 webkitgtk: malicious crafted web content leads to arbitrary we content</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719231" id="1719231">CVE-2019-8558 webkitgtk: malicious crafted web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719235" id="1719235">CVE-2019-8559 webkitgtk: malicious web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719237" id="1719237">CVE-2019-8563 webkitgtk: malicious web content leads to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719238" id="1719238">CVE-2019-8551 webkitgtk: malicious web content leads to cross site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1726505" id="1726505">CVE-2019-12795 gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876612" id="1876612">CVE-2019-8726 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876614" id="1876614">CVE-2019-8735 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876616" id="1876616">CVE-2019-8768 webkitgtk: Browsing history could not be deleted</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876630" id="1876630">CVE-2019-8666 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876632" id="1876632">CVE-2019-8671 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876634" id="1876634">CVE-2019-8672 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876643" id="1876643">CVE-2019-8673 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876644" id="1876644">CVE-2019-8676 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876645" id="1876645">CVE-2019-8677 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876647" id="1876647">CVE-2019-8679 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876650" id="1876650">CVE-2019-8681 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876653" id="1876653">CVE-2019-8686 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876655" id="1876655">CVE-2019-8687 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876657" id="1876657">CVE-2019-8689 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876664" id="1876664">CVE-2019-8690 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876880" id="1876880">CVE-2019-6237 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876881" id="1876881">CVE-2019-8571 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876882" id="1876882">CVE-2019-8583 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876883" id="1876883">CVE-2019-8584 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876884" id="1876884">CVE-2019-8586 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876887" id="1876887">CVE-2019-8587 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876891" id="1876891">CVE-2019-8594 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876892" id="1876892">CVE-2019-8595 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876893" id="1876893">CVE-2019-8596 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876894" id="1876894">CVE-2019-8597 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876895" id="1876895">CVE-2019-8601 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876897" id="1876897">CVE-2019-8607 webkitgtk: Out-of-bounds read leading to memory disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876898" id="1876898">CVE-2019-8608 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876899" id="1876899">CVE-2019-8609 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876900" id="1876900">CVE-2019-8610 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1877045" id="1877045">CVE-2019-8615 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1877046" id="1877046">CVE-2019-8611 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1877047" id="1877047">CVE-2019-8619 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1877048" id="1877048">CVE-2019-8622 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1877049" id="1877049">CVE-2019-8623 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="wayland-protocols-devel is earlier than 0:1.17-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553001"/>
              <criterion comment="wayland-protocols-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL is earlier than 0:1.2.15-35.el8" test_ref="oval:org.almalinux.alsa:tst:20193553003"/>
              <criterion comment="SDL is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL-devel is earlier than 0:1.2.15-35.el8" test_ref="oval:org.almalinux.alsa:tst:20193553005"/>
              <criterion comment="SDL-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-remote-desktop is earlier than 0:0.1.6-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553007"/>
              <criterion comment="gnome-remote-desktop is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="file-roller is earlier than 0:3.28.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193553009"/>
              <criterion comment="file-roller is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libpurple is earlier than 0:2.13.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553011"/>
              <criterion comment="libpurple is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libpurple-devel is earlier than 0:2.13.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553013"/>
              <criterion comment="libpurple-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pidgin is earlier than 0:2.13.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553015"/>
              <criterion comment="pidgin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pidgin-devel is earlier than 0:2.13.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553017"/>
              <criterion comment="pidgin-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-desktop3 is earlier than 0:3.32.2-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553019"/>
              <criterion comment="gnome-desktop3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-desktop3-devel is earlier than 0:3.32.2-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553021"/>
              <criterion comment="gnome-desktop3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince is earlier than 0:3.28.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553023"/>
              <criterion comment="evince is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-browser-plugin is earlier than 0:3.28.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553025"/>
              <criterion comment="evince-browser-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-libs is earlier than 0:3.28.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553027"/>
              <criterion comment="evince-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-nautilus is earlier than 0:3.28.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553029"/>
              <criterion comment="evince-nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice is earlier than 0:0.6.50-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193553031"/>
              <criterion comment="accountsservice is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice-devel is earlier than 0:0.6.50-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193553033"/>
              <criterion comment="accountsservice-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice-libs is earlier than 0:0.6.50-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193553035"/>
              <criterion comment="accountsservice-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-tweaks is earlier than 0:3.28.1-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553037"/>
              <criterion comment="gnome-tweaks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553039"/>
              <criterion comment="nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-devel is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553041"/>
              <criterion comment="nautilus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-extensions is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553043"/>
              <criterion comment="nautilus-extensions is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="baobab is earlier than 0:3.28.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193553045"/>
              <criterion comment="baobab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-settings-daemon is earlier than 0:3.32.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193553047"/>
              <criterion comment="gnome-settings-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3 is earlier than 0:2.24.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553049"/>
              <criterion comment="webkit2gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-devel is earlier than 0:2.24.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553051"/>
              <criterion comment="webkit2gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc is earlier than 0:2.24.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553053"/>
              <criterion comment="webkit2gtk3-jsc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc-devel is earlier than 0:2.24.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553055"/>
              <criterion comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-plugin-process-gtk2 is earlier than 0:2.24.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193553057"/>
              <criterion comment="webkit2gtk3-plugin-process-gtk2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-software is earlier than 0:3.30.6-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193553059"/>
              <criterion comment="gnome-software is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-software-editor is earlier than 0:3.30.6-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193553061"/>
              <criterion comment="gnome-software-editor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="chrome-gnome-shell is earlier than 0:10.1-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553063"/>
              <criterion comment="chrome-gnome-shell is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas is earlier than 0:3.32.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553065"/>
              <criterion comment="gsettings-desktop-schemas is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas-devel is earlier than 0:3.32.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553067"/>
              <criterion comment="gsettings-desktop-schemas-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-classic-session is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553069"/>
              <criterion comment="gnome-classic-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-apps-menu is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553071"/>
              <criterion comment="gnome-shell-extension-apps-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-auto-move-windows is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553073"/>
              <criterion comment="gnome-shell-extension-auto-move-windows is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-common is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553075"/>
              <criterion comment="gnome-shell-extension-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-dash-to-dock is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553077"/>
              <criterion comment="gnome-shell-extension-dash-to-dock is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-desktop-icons is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553079"/>
              <criterion comment="gnome-shell-extension-desktop-icons is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-disable-screenshield is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553081"/>
              <criterion comment="gnome-shell-extension-disable-screenshield is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-drive-menu is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553083"/>
              <criterion comment="gnome-shell-extension-drive-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-horizontal-workspaces is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553085"/>
              <criterion comment="gnome-shell-extension-horizontal-workspaces is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-launch-new-instance is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553087"/>
              <criterion comment="gnome-shell-extension-launch-new-instance is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-native-window-placement is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553089"/>
              <criterion comment="gnome-shell-extension-native-window-placement is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-no-hot-corner is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553091"/>
              <criterion comment="gnome-shell-extension-no-hot-corner is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-panel-favorites is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553093"/>
              <criterion comment="gnome-shell-extension-panel-favorites is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-places-menu is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553095"/>
              <criterion comment="gnome-shell-extension-places-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-screenshot-window-sizer is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553097"/>
              <criterion comment="gnome-shell-extension-screenshot-window-sizer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-systemMonitor is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553099"/>
              <criterion comment="gnome-shell-extension-systemMonitor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-top-icons is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553101"/>
              <criterion comment="gnome-shell-extension-top-icons is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-updates-dialog is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553103"/>
              <criterion comment="gnome-shell-extension-updates-dialog is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-user-theme is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553105"/>
              <criterion comment="gnome-shell-extension-user-theme is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-window-grouper is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553107"/>
              <criterion comment="gnome-shell-extension-window-grouper is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-window-list is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553109"/>
              <criterion comment="gnome-shell-extension-window-list is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-windowsNavigator is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553111"/>
              <criterion comment="gnome-shell-extension-windowsNavigator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-workspace-indicator is earlier than 0:3.32.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553113"/>
              <criterion comment="gnome-shell-extension-workspace-indicator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdm is earlier than 1:3.28.3-22.el8" test_ref="oval:org.almalinux.alsa:tst:20193553115"/>
              <criterion comment="gdm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center is earlier than 0:3.28.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553117"/>
              <criterion comment="gnome-control-center is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center-filesystem is earlier than 0:3.28.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553119"/>
              <criterion comment="gnome-control-center-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="appstream-data is earlier than 0:8-20190805.el8" test_ref="oval:org.almalinux.alsa:tst:20193553121"/>
              <criterion comment="appstream-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553123"/>
              <criterion comment="gvfs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afc is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553125"/>
              <criterion comment="gvfs-afc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afp is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553127"/>
              <criterion comment="gvfs-afp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-archive is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553129"/>
              <criterion comment="gvfs-archive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-client is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553131"/>
              <criterion comment="gvfs-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-devel is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553133"/>
              <criterion comment="gvfs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-fuse is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553135"/>
              <criterion comment="gvfs-fuse is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-goa is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553137"/>
              <criterion comment="gvfs-goa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-gphoto2 is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553139"/>
              <criterion comment="gvfs-gphoto2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-mtp is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553141"/>
              <criterion comment="gvfs-mtp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-smb is earlier than 0:1.36.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553143"/>
              <criterion comment="gvfs-smb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell is earlier than 0:3.32.2-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193553145"/>
              <criterion comment="gnome-shell is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk-update-icon-cache is earlier than 0:3.22.30-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193553147"/>
              <criterion comment="gtk-update-icon-cache is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3 is earlier than 0:3.22.30-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193553149"/>
              <criterion comment="gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-devel is earlier than 0:3.22.30-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193553151"/>
              <criterion comment="gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-immodule-xim is earlier than 0:3.22.30-4.el8" test_ref="oval:org.almalinux.alsa:tst:20193553153"/>
              <criterion comment="gtk3-immodule-xim is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter is earlier than 0:3.32.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553155"/>
              <criterion comment="mutter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter-devel is earlier than 0:3.32.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193553157"/>
              <criterion comment="mutter-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pango is earlier than 0:1.42.4-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553159"/>
              <criterion comment="pango is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192582002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pango-devel is earlier than 0:1.42.4-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193553161"/>
              <criterion comment="pango-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192582004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdk-pixbuf2 is earlier than 0:2.36.12-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553163"/>
              <criterion comment="gdk-pixbuf2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdk-pixbuf2-devel is earlier than 0:2.36.12-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553165"/>
              <criterion comment="gdk-pixbuf2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdk-pixbuf2-modules is earlier than 0:2.36.12-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553167"/>
              <criterion comment="gdk-pixbuf2-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdk-pixbuf2-xlib is earlier than 0:2.36.12-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553169"/>
              <criterion comment="gdk-pixbuf2-xlib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdk-pixbuf2-xlib-devel is earlier than 0:2.36.12-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193553171"/>
              <criterion comment="gdk-pixbuf2-xlib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs60 is earlier than 0:60.9.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553173"/>
              <criterion comment="mozjs60 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs60-devel is earlier than 0:60.9.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553175"/>
              <criterion comment="mozjs60-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gjs is earlier than 0:1.56.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553177"/>
              <criterion comment="gjs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gjs-devel is earlier than 0:1.56.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193553179"/>
              <criterion comment="gjs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553181"/>
              <criterion comment="plymouth is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-core-libs is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553183"/>
              <criterion comment="plymouth-core-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-graphics-libs is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553185"/>
              <criterion comment="plymouth-graphics-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-fade-throbber is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553187"/>
              <criterion comment="plymouth-plugin-fade-throbber is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-label is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553189"/>
              <criterion comment="plymouth-plugin-label is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-script is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553191"/>
              <criterion comment="plymouth-plugin-script is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-space-flares is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553193"/>
              <criterion comment="plymouth-plugin-space-flares is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-throbgress is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553195"/>
              <criterion comment="plymouth-plugin-throbgress is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-plugin-two-step is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553197"/>
              <criterion comment="plymouth-plugin-two-step is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-scripts is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553199"/>
              <criterion comment="plymouth-scripts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-system-theme is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553201"/>
              <criterion comment="plymouth-system-theme is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-charge is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553203"/>
              <criterion comment="plymouth-theme-charge is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-fade-in is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553205"/>
              <criterion comment="plymouth-theme-fade-in is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-script is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553207"/>
              <criterion comment="plymouth-theme-script is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-solar is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553209"/>
              <criterion comment="plymouth-theme-solar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-spinfinity is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553211"/>
              <criterion comment="plymouth-theme-spinfinity is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="plymouth-theme-spinner is earlier than 0:0.9.3-15.el8" test_ref="oval:org.almalinux.alsa:tst:20193553213"/>
              <criterion comment="plymouth-theme-spinner is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553214"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193575" version="636">
      <metadata>
        <title>ALSA-2019:3575: elfutils security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3575" ref_url="https://errata.almalinux.org/8/ALSA-2019-3575.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3575" ref_url="https://access.redhat.com/errata/RHSA-2019:3575" source="RHSA"/>
        <reference ref_id="CVE-2019-7146" ref_url="https://access.redhat.com/security/cve/CVE-2019-7146" source="CVE"/>
        <reference ref_id="CVE-2019-7149" ref_url="https://access.redhat.com/security/cve/CVE-2019-7149" source="CVE"/>
        <reference ref_id="CVE-2019-7150" ref_url="https://access.redhat.com/security/cve/CVE-2019-7150" source="CVE"/>
        <reference ref_id="CVE-2019-7664" ref_url="https://access.redhat.com/security/cve/CVE-2019-7664" source="CVE"/>
        <reference ref_id="CVE-2019-7665" ref_url="https://access.redhat.com/security/cve/CVE-2019-7665" source="CVE"/>
        <description>The elfutils packages contain a number of utility programs and libraries related to the creation and maintenance of executable code.

The following packages have been upgraded to a later upstream version: elfutils (0.176). (BZ#1683705)

Security Fix(es):

* elfutils: buffer over-read in the ebl_object_note function in eblobjnote.c in libebl (CVE-2019-7146)

* elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149)

* elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150)

* elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664)

* elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7146" impact="low" public="20190109">CVE-2019-7146</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7149" impact="low" public="20190118">CVE-2019-7149</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7150" impact="low" public="20181010">CVE-2019-7150</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-7664" impact="low" public="20190111">CVE-2019-7664</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7665" impact="low" public="20190112">CVE-2019-7665</cve>
          <bugzilla href="https://bugzilla.redhat.com/1671432" id="1671432">CVE-2019-7146 elfutils: buffer over-read in the ebl_object_note function in eblobjnote.c in libebl</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1671443" id="1671443">CVE-2019-7149 elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1671446" id="1671446">CVE-2019-7150 elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677536" id="1677536">CVE-2019-7664 elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677538" id="1677538">CVE-2019-7665 elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="elfutils is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575001"/>
              <criterion comment="elfutils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-default-yama-scope is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575003"/>
              <criterion comment="elfutils-default-yama-scope is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-devel is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575005"/>
              <criterion comment="elfutils-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-devel-static is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575007"/>
              <criterion comment="elfutils-devel-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-libelf is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575009"/>
              <criterion comment="elfutils-libelf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-libelf-devel is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575011"/>
              <criterion comment="elfutils-libelf-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-libelf-devel-static is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575013"/>
              <criterion comment="elfutils-libelf-devel-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="elfutils-libs is earlier than 0:0.176-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193575015"/>
              <criterion comment="elfutils-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193575016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193582" version="637">
      <metadata>
        <title>ALSA-2019:3582: samba security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3582" ref_url="https://errata.almalinux.org/8/ALSA-2019-3582.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3582" ref_url="https://access.redhat.com/errata/RHSA-2019:3582" source="RHSA"/>
        <reference ref_id="CVE-2019-3880" ref_url="https://access.redhat.com/security/cve/CVE-2019-3880" source="CVE"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.10.4). (BZ#1638001)

Security Fix(es):

* samba: save registry file outside share as unprivileged user (CVE-2019-3880)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-3880" impact="moderate" public="20190409">CVE-2019-3880</cve>
          <bugzilla href="https://bugzilla.redhat.com/1691518" id="1691518">CVE-2019-3880 samba: save registry file outside share as unprivileged user</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ctdb is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582001"/>
              <criterion comment="ctdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ctdb-tests is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582003"/>
              <criterion comment="ctdb-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsmbclient is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582005"/>
              <criterion comment="libsmbclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsmbclient-devel is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582007"/>
              <criterion comment="libsmbclient-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwbclient is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582009"/>
              <criterion comment="libwbclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwbclient-devel is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582011"/>
              <criterion comment="libwbclient-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-samba is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582013"/>
              <criterion comment="python3-samba is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-samba-test is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582015"/>
              <criterion comment="python3-samba-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582017"/>
              <criterion comment="samba is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-client is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582019"/>
              <criterion comment="samba-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-client-libs is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582021"/>
              <criterion comment="samba-client-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582023"/>
              <criterion comment="samba-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common-libs is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582025"/>
              <criterion comment="samba-common-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common-tools is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582027"/>
              <criterion comment="samba-common-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-krb5-printing is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582029"/>
              <criterion comment="samba-krb5-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-libs is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582031"/>
              <criterion comment="samba-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-pidl is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582033"/>
              <criterion comment="samba-pidl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-test is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582035"/>
              <criterion comment="samba-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-test-libs is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582037"/>
              <criterion comment="samba-test-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582039"/>
              <criterion comment="samba-winbind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-clients is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582041"/>
              <criterion comment="samba-winbind-clients is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-krb5-locator is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582043"/>
              <criterion comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-modules is earlier than 0:4.10.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193582045"/>
              <criterion comment="samba-winbind-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582046"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193583" version="642">
      <metadata>
        <title>ALSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3583" ref_url="https://errata.almalinux.org/8/ALSA-2019-3583.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3583" ref_url="https://access.redhat.com/errata/RHSA-2019:3583" source="RHSA"/>
        <reference ref_id="CVE-2018-20534" ref_url="https://access.redhat.com/security/cve/CVE-2018-20534" source="CVE"/>
        <reference ref_id="CVE-2019-3817" ref_url="https://access.redhat.com/security/cve/CVE-2019-3817" source="CVE"/>
        <description>Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. 

The following packages have been upgraded to a later upstream version: dnf (4.2.7), dnf-plugins-core (4.0.8), libcomps (0.1.11), libdnf (0.35.1), librepo (1.10.3), libsolv (0.7.4). (BZ#1690288, BZ#1690289, BZ#1690299, BZ#1692402, BZ#1694019, BZ#1697946)

Security Fix(es):

* libcomps: use after free when merging two objmrtrees (CVE-2019-3817)

* libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-20534" impact="low" public="20181122">CVE-2018-20534</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-3817" impact="moderate" public="20190121">CVE-2019-3817</cve>
          <bugzilla href="https://bugzilla.redhat.com/1665538" id="1665538">CVE-2018-20534 libsolv: illegal address access in pool_whatprovides in src/pool.h</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1668005" id="1668005">CVE-2019-3817 libcomps: use after free when merging two objmrtrees</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libsolv is earlier than 0:0.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583001"/>
              <criterion comment="libsolv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="librhsm is earlier than 0:0.0.3-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583003"/>
              <criterion comment="librhsm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcomps is earlier than 0:0.1.11-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193583005"/>
              <criterion comment="libcomps is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcomps-devel is earlier than 0:0.1.11-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193583007"/>
              <criterion comment="libcomps-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libcomps is earlier than 0:0.1.11-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193583009"/>
              <criterion comment="python3-libcomps is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="createrepo_c is earlier than 0:0.11.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583011"/>
              <criterion comment="createrepo_c is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="createrepo_c-devel is earlier than 0:0.11.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583013"/>
              <criterion comment="createrepo_c-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="createrepo_c-libs is earlier than 0:0.11.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583015"/>
              <criterion comment="createrepo_c-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-createrepo_c is earlier than 0:0.11.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583017"/>
              <criterion comment="python3-createrepo_c is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnf-plugins-core is earlier than 0:4.0.8-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583019"/>
              <criterion comment="dnf-plugins-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-dnf-plugin-versionlock is earlier than 0:4.0.8-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583021"/>
              <criterion comment="python3-dnf-plugin-versionlock is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-dnf-plugins-core is earlier than 0:4.0.8-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583023"/>
              <criterion comment="python3-dnf-plugins-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="yum-utils is earlier than 0:4.0.8-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583025"/>
              <criterion comment="yum-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="microdnf is earlier than 0:3.0.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583027"/>
              <criterion comment="microdnf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnf is earlier than 0:4.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193583029"/>
              <criterion comment="dnf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnf-automatic is earlier than 0:4.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193583031"/>
              <criterion comment="dnf-automatic is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnf-data is earlier than 0:4.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193583033"/>
              <criterion comment="dnf-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-dnf is earlier than 0:4.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193583035"/>
              <criterion comment="python3-dnf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="yum is earlier than 0:4.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20193583037"/>
              <criterion comment="yum is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="librepo is earlier than 0:1.10.3-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583039"/>
              <criterion comment="librepo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-librepo is earlier than 0:1.10.3-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193583041"/>
              <criterion comment="python3-librepo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libdnf is earlier than 0:0.35.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193583043"/>
              <criterion comment="libdnf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-hawkey is earlier than 0:0.35.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193583045"/>
              <criterion comment="python3-hawkey is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libdnf is earlier than 0:0.35.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193583047"/>
              <criterion comment="python3-libdnf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583048"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193590" version="636">
      <metadata>
        <title>ALSA-2019:3590: python-urllib3 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3590" ref_url="https://errata.almalinux.org/8/ALSA-2019-3590.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3590" ref_url="https://access.redhat.com/errata/RHSA-2019:3590" source="RHSA"/>
        <reference ref_id="CVE-2019-11236" ref_url="https://access.redhat.com/security/cve/CVE-2019-11236" source="CVE"/>
        <reference ref_id="CVE-2019-11324" ref_url="https://access.redhat.com/security/cve/CVE-2019-11324" source="CVE"/>
        <description>The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.

Security Fix(es):

* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)

* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-11236" impact="moderate" public="20190313">CVE-2019-11236</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-11324" impact="moderate" public="20190417">CVE-2019-11324</cve>
          <bugzilla href="https://bugzilla.redhat.com/1700824" id="1700824">CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702473" id="1702473">CVE-2019-11324 python-urllib3: Certification mishandle when error should be thrown</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="python3-urllib3 is earlier than 0:1.24.2-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193590001"/>
          <criterion comment="python3-urllib3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193590002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193592" version="636">
      <metadata>
        <title>ALSA-2019:3592: systemd security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3592" ref_url="https://errata.almalinux.org/8/ALSA-2019-3592.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3592" ref_url="https://access.redhat.com/errata/RHSA-2019:3592" source="RHSA"/>
        <reference ref_id="CVE-2019-15718" ref_url="https://access.redhat.com/security/cve/CVE-2019-15718" source="CVE"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: systemd-resolved allows unprivileged users to configure DNS (CVE-2019-15718)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-15718" impact="moderate" public="20190903:1500">CVE-2019-15718</cve>
          <bugzilla href="https://bugzilla.redhat.com/1746057" id="1746057">CVE-2019-15718 systemd: systemd-resolved allows unprivileged users to configure DNS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="systemd is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592001"/>
              <criterion comment="systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-container is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592003"/>
              <criterion comment="systemd-container is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-devel is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592005"/>
              <criterion comment="systemd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-journal-remote is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592007"/>
              <criterion comment="systemd-journal-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-libs is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592009"/>
              <criterion comment="systemd-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-pam is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592011"/>
              <criterion comment="systemd-pam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-tests is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592013"/>
              <criterion comment="systemd-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-udev is earlier than 0:239-18.el8" test_ref="oval:org.almalinux.alsa:tst:20193592015"/>
              <criterion comment="systemd-udev is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193600" version="637">
      <metadata>
        <title>ALSA-2019:3600: gnutls security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3600" ref_url="https://errata.almalinux.org/8/ALSA-2019-3600.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3600" ref_url="https://access.redhat.com/errata/RHSA-2019:3600" source="RHSA"/>
        <reference ref_id="CVE-2019-3829" ref_url="https://access.redhat.com/security/cve/CVE-2019-3829" source="CVE"/>
        <reference ref_id="CVE-2019-3836" ref_url="https://access.redhat.com/security/cve/CVE-2019-3836" source="CVE"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

The following packages have been upgraded to a later upstream version: gnutls (3.6.8). (BZ#1689967)

Security Fix(es):

* gnutls: use-after-free/double-free in certificate verification (CVE-2019-3829)

* gnutls: invalid pointer access upon receiving async handshake messages (CVE-2019-3836)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-3829" impact="moderate" public="20190327">CVE-2019-3829</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-456" href="https://access.redhat.com/security/cve/CVE-2019-3836" impact="moderate" public="20190327">CVE-2019-3836</cve>
          <bugzilla href="https://bugzilla.redhat.com/1677048" id="1677048">CVE-2019-3829 gnutls: use-after-free/double-free in certificate verification</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1678411" id="1678411">CVE-2019-3836 gnutls: invalid pointer access upon receiving async handshake messages</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnutls is earlier than 0:3.6.8-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193600001"/>
              <criterion comment="gnutls is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-c++ is earlier than 0:3.6.8-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193600003"/>
              <criterion comment="gnutls-c++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-dane is earlier than 0:3.6.8-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193600005"/>
              <criterion comment="gnutls-dane is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-devel is earlier than 0:3.6.8-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193600007"/>
              <criterion comment="gnutls-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-utils is earlier than 0:3.6.8-8.el8" test_ref="oval:org.almalinux.alsa:tst:20193600009"/>
              <criterion comment="gnutls-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193610" version="637">
      <metadata>
        <title>ALSA-2019:3610: libqb security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3610" ref_url="https://errata.almalinux.org/8/ALSA-2019-3610.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3610" ref_url="https://access.redhat.com/errata/RHSA-2019:3610" source="RHSA"/>
        <reference ref_id="CVE-2019-12779" ref_url="https://access.redhat.com/security/cve/CVE-2019-12779" source="CVE"/>
        <description>The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.

Security Fix(es):

* libqb: Insecure treatment of IPC (temporary) files (CVE-2019-12779)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" cwe="CWE-377" href="https://access.redhat.com/security/cve/CVE-2019-12779" impact="moderate" public="20190403">CVE-2019-12779</cve>
          <bugzilla href="https://bugzilla.redhat.com/1695948" id="1695948">CVE-2019-12779 libqb: Insecure treatment of IPC (temporary) files</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libqb is earlier than 0:1.0.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193610001"/>
              <criterion comment="libqb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193610002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libqb-devel is earlier than 0:1.0.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193610003"/>
              <criterion comment="libqb-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193610004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193624" version="636">
      <metadata>
        <title>ALSA-2019:3624: libseccomp security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3624" ref_url="https://errata.almalinux.org/8/ALSA-2019-3624.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3624" ref_url="https://access.redhat.com/errata/RHSA-2019:3624" source="RHSA"/>
        <reference ref_id="CVE-2019-9893" ref_url="https://access.redhat.com/security/cve/CVE-2019-9893" source="CVE"/>
        <description>The libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API allows an application to specify which system calls or system call arguments the application is allowed to execute, all of which are then enforced by the Linux Kernel.

The following packages have been upgraded to a later upstream version: libseccomp (2.4.1). (BZ#1688938)

Security Fix(es):

* libseccomp: incorrect generation of syscall filters in libseccomp (CVE-2019-9893)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2019-9893" impact="moderate" public="20190314">CVE-2019-9893</cve>
          <bugzilla href="https://bugzilla.redhat.com/1690897" id="1690897">CVE-2019-9893 libseccomp: incorrect generation of syscall filters in libseccomp</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libseccomp is earlier than 0:2.4.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193624001"/>
              <criterion comment="libseccomp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193624002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libseccomp-devel is earlier than 0:2.4.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20193624003"/>
              <criterion comment="libseccomp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193624004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193643" version="636">
      <metadata>
        <title>ALSA-2019:3643: gettext security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3643" ref_url="https://errata.almalinux.org/8/ALSA-2019-3643.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3643" ref_url="https://access.redhat.com/errata/RHSA-2019:3643" source="RHSA"/>
        <reference ref_id="CVE-2018-18751" ref_url="https://access.redhat.com/security/cve/CVE-2018-18751" source="CVE"/>
        <description>The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs.

Security Fix(es):

* gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-18751" impact="low" public="20181028">CVE-2018-18751</cve>
          <bugzilla href="https://bugzilla.redhat.com/1647043" id="1647043">CVE-2018-18751 gettext: double free in default_add_message in read-catalog.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gettext is earlier than 0:0.19.8.1-17.el8" test_ref="oval:org.almalinux.alsa:tst:20193643001"/>
              <criterion comment="gettext is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193643002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gettext-common-devel is earlier than 0:0.19.8.1-17.el8" test_ref="oval:org.almalinux.alsa:tst:20193643003"/>
              <criterion comment="gettext-common-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193643004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gettext-devel is earlier than 0:0.19.8.1-17.el8" test_ref="oval:org.almalinux.alsa:tst:20193643005"/>
              <criterion comment="gettext-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193643006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gettext-libs is earlier than 0:0.19.8.1-17.el8" test_ref="oval:org.almalinux.alsa:tst:20193643007"/>
              <criterion comment="gettext-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193643008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193651" version="636">
      <metadata>
        <title>ALSA-2019:3651: sssd security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3651" ref_url="https://errata.almalinux.org/8/ALSA-2019-3651.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3651" ref_url="https://access.redhat.com/errata/RHSA-2019:3651" source="RHSA"/>
        <reference ref_id="CVE-2018-16838" ref_url="https://access.redhat.com/security/cve/CVE-2018-16838" source="CVE"/>
        <description>The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.

The following packages have been upgraded to a later upstream version: sssd (2.2.0). (BZ#1687281)

Security Fix(es):

* sssd: improper implementation of GPOs due to too restrictive permissions (CVE-2018-16838)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2018-16838" impact="low" public="20190204">CVE-2018-16838</cve>
          <bugzilla href="https://bugzilla.redhat.com/1640820" id="1640820">CVE-2018-16838 sssd: improper implementation of GPOs due to too restrictive permissions</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libipa_hbac is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651001"/>
              <criterion comment="libipa_hbac is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_autofs is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651003"/>
              <criterion comment="libsss_autofs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_certmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651005"/>
              <criterion comment="libsss_certmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_idmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651007"/>
              <criterion comment="libsss_idmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_nss_idmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651009"/>
              <criterion comment="libsss_nss_idmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_nss_idmap-devel is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651011"/>
              <criterion comment="libsss_nss_idmap-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_simpleifp is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651013"/>
              <criterion comment="libsss_simpleifp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsss_sudo is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651015"/>
              <criterion comment="libsss_sudo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libipa_hbac is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651017"/>
              <criterion comment="python3-libipa_hbac is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libsss_nss_idmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651019"/>
              <criterion comment="python3-libsss_nss_idmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-sss is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651021"/>
              <criterion comment="python3-sss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-sss-murmur is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651023"/>
              <criterion comment="python3-sss-murmur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-sssdconfig is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651025"/>
              <criterion comment="python3-sssdconfig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651027"/>
              <criterion comment="sssd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-ad is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651029"/>
              <criterion comment="sssd-ad is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-client is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651031"/>
              <criterion comment="sssd-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-common is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651033"/>
              <criterion comment="sssd-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-common-pac is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651035"/>
              <criterion comment="sssd-common-pac is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-dbus is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651037"/>
              <criterion comment="sssd-dbus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-ipa is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651039"/>
              <criterion comment="sssd-ipa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-kcm is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651041"/>
              <criterion comment="sssd-kcm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-krb5 is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651043"/>
              <criterion comment="sssd-krb5 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-krb5-common is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651045"/>
              <criterion comment="sssd-krb5-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-ldap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651047"/>
              <criterion comment="sssd-ldap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-libwbclient is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651049"/>
              <criterion comment="sssd-libwbclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-nfs-idmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651051"/>
              <criterion comment="sssd-nfs-idmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-polkit-rules is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651053"/>
              <criterion comment="sssd-polkit-rules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-proxy is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651055"/>
              <criterion comment="sssd-proxy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-tools is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651057"/>
              <criterion comment="sssd-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sssd-winbind-idmap is earlier than 0:2.2.0-19.el8" test_ref="oval:org.almalinux.alsa:tst:20193651059"/>
              <criterion comment="sssd-winbind-idmap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193651060"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193673" version="636">
      <metadata>
        <title>ALSA-2019:3673: lldpad security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3673" ref_url="https://errata.almalinux.org/8/ALSA-2019-3673.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3673" ref_url="https://access.redhat.com/errata/RHSA-2019:3673" source="RHSA"/>
        <reference ref_id="CVE-2018-10932" ref_url="https://access.redhat.com/security/cve/CVE-2018-10932" source="CVE"/>
        <description>The lldpad packages provide the Linux user space daemon and configuration tool for Intel's Link Layer Discovery Protocol (LLDP) Agent with Enhanced Ethernet support.

Security Fix(es):

* lldptool: improper sanitization of shell-escape codes (CVE-2018-10932)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-117" href="https://access.redhat.com/security/cve/CVE-2018-10932" impact="low" public="20180810:1601">CVE-2018-10932</cve>
          <bugzilla href="https://bugzilla.redhat.com/1614896" id="1614896">CVE-2018-10932 lldptool: improper sanitization of shell-escape codes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="lldpad is earlier than 0:1.0.1-13.git036e314.el8" test_ref="oval:org.almalinux.alsa:tst:20193673001"/>
          <criterion comment="lldpad is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193673002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193694" version="635">
      <metadata>
        <title>ALSA-2019:3694: sudo security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3694" ref_url="https://errata.almalinux.org/8/ALSA-2019-3694.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3694" ref_url="https://access.redhat.com/errata/RHSA-2019:3694" source="RHSA"/>
        <reference ref_id="CVE-2019-14287" ref_url="https://access.redhat.com/security/cve/CVE-2019-14287" source="CVE"/>
        <description>The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

Security Fix(es):

* sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword (CVE-2019-14287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-267" href="https://access.redhat.com/security/cve/CVE-2019-14287" impact="important" public="20191014:1500">CVE-2019-14287</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760531" id="1760531">CVE-2019-14287 sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="sudo is earlier than 0:1.8.25p1-8.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193694001"/>
          <criterion comment="sudo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193694002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193698" version="636">
      <metadata>
        <title>ALSA-2019:3698: libarchive security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3698" ref_url="https://errata.almalinux.org/8/ALSA-2019-3698.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3698" ref_url="https://access.redhat.com/errata/RHSA-2019:3698" source="RHSA"/>
        <reference ref_id="CVE-2017-14503" ref_url="https://access.redhat.com/security/cve/CVE-2017-14503" source="CVE"/>
        <reference ref_id="CVE-2018-1000877" ref_url="https://access.redhat.com/security/cve/CVE-2018-1000877" source="CVE"/>
        <reference ref_id="CVE-2018-1000878" ref_url="https://access.redhat.com/security/cve/CVE-2018-1000878" source="CVE"/>
        <reference ref_id="CVE-2019-1000019" ref_url="https://access.redhat.com/security/cve/CVE-2019-1000019" source="CVE"/>
        <reference ref_id="CVE-2019-1000020" ref_url="https://access.redhat.com/security/cve/CVE-2019-1000020" source="CVE"/>
        <description>The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.

Security Fix(es):

* libarchive: Double free in RAR decoder resulting in a denial of service (CVE-2018-1000877)

* libarchive: Use after free in RAR decoder resulting in a denial of service (CVE-2018-1000878)

* libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service (CVE-2019-1000019)

* libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service (CVE-2019-1000020)

* libarchive: Out-of-bounds read in lha_read_data_none (CVE-2017-14503)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2017-14503" impact="low" public="20170916">CVE-2017-14503</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-1000877" impact="moderate" public="20181120">CVE-2018-1000877</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-1000878" impact="moderate" public="20181120">CVE-2018-1000878</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-1000019" impact="moderate" public="20190120">CVE-2019-1000019</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-1000020" impact="moderate" public="20190120">CVE-2019-1000020</cve>
          <bugzilla href="https://bugzilla.redhat.com/1494449" id="1494449">CVE-2017-14503 libarchive: Out-of-bounds read in lha_read_data_none</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663887" id="1663887">CVE-2018-1000877 libarchive: Double free in RAR decoder resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1663889" id="1663889">CVE-2018-1000878 libarchive: Use after free in RAR decoder resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1672888" id="1672888">CVE-2019-1000020 libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1672892" id="1672892">CVE-2019-1000019 libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bsdtar is earlier than 0:3.3.2-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193698001"/>
              <criterion comment="bsdtar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive is earlier than 0:3.3.2-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193698003"/>
              <criterion comment="libarchive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive-devel is earlier than 0:3.3.2-7.el8" test_ref="oval:org.almalinux.alsa:tst:20193698005"/>
              <criterion comment="libarchive-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193699" version="636">
      <metadata>
        <title>ALSA-2019:3699: evolution security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3699" ref_url="https://errata.almalinux.org/8/ALSA-2019-3699.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3699" ref_url="https://access.redhat.com/errata/RHSA-2019:3699" source="RHSA"/>
        <reference ref_id="CVE-2019-3890" ref_url="https://access.redhat.com/security/cve/CVE-2019-3890" source="CVE"/>
        <description>Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.

Security Fix(es):

* evolution-ews: all certificate errors ignored if configured to ignore an initial error in gnome-online-accounts creation resulting in the connection open to being viewed and modified. (CVE-2019-3890)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="(CWE-295|CWE-296)" href="https://access.redhat.com/security/cve/CVE-2019-3890" impact="moderate" public="20190215">CVE-2019-3890</cve>
          <bugzilla href="https://bugzilla.redhat.com/1678313" id="1678313">CVE-2019-3890 evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="evolution-ews is earlier than 0:3.28.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193699001"/>
              <criterion comment="evolution-ews is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-ews-langpacks is earlier than 0:3.28.5-5.el8" test_ref="oval:org.almalinux.alsa:tst:20193699003"/>
              <criterion comment="evolution-ews-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699005"/>
              <criterion comment="evolution-data-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-devel is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699007"/>
              <criterion comment="evolution-data-server-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-doc is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699009"/>
              <criterion comment="evolution-data-server-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-langpacks is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699011"/>
              <criterion comment="evolution-data-server-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-perl is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699013"/>
              <criterion comment="evolution-data-server-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-tests is earlier than 0:3.28.5-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193699015"/>
              <criterion comment="evolution-data-server-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699017"/>
              <criterion comment="evolution is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-bogofilter is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699019"/>
              <criterion comment="evolution-bogofilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-devel is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699021"/>
              <criterion comment="evolution-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-help is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699023"/>
              <criterion comment="evolution-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-langpacks is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699025"/>
              <criterion comment="evolution-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-pst is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699027"/>
              <criterion comment="evolution-pst is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-spamassassin is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193699029"/>
              <criterion comment="evolution-spamassassin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699030"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193700" version="635">
      <metadata>
        <title>ALSA-2019:3700: openssl security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3700" ref_url="https://errata.almalinux.org/8/ALSA-2019-3700.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3700" ref_url="https://access.redhat.com/errata/RHSA-2019:3700" source="RHSA"/>
        <reference ref_id="CVE-2018-0734" ref_url="https://access.redhat.com/security/cve/CVE-2018-0734" source="CVE"/>
        <reference ref_id="CVE-2018-0735" ref_url="https://access.redhat.com/security/cve/CVE-2018-0735" source="CVE"/>
        <reference ref_id="CVE-2019-1543" ref_url="https://access.redhat.com/security/cve/CVE-2019-1543" source="CVE"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

The following packages have been upgraded to a later upstream version: openssl (1.1.1c). (BZ#1643026)

Security Fix(es):

* openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)

* openssl: timing side channel attack in the ECDSA signature generation (CVE-2018-0735)

* openssl: ChaCha20-Poly1305 with long nonces (CVE-2019-1543)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-0734" impact="low" public="20181016">CVE-2018-0734</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385" href="https://access.redhat.com/security/cve/CVE-2018-0735" impact="low" public="20181025">CVE-2018-0735</cve>
          <cve cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-323" href="https://access.redhat.com/security/cve/CVE-2019-1543" impact="low" public="20190306">CVE-2019-1543</cve>
          <bugzilla href="https://bugzilla.redhat.com/1644356" id="1644356">CVE-2018-0735 openssl: timing side channel attack in the ECDSA signature generation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1644364" id="1644364">CVE-2018-0734 openssl: timing side channel attack in the DSA signature algorithm</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695954" id="1695954">CVE-2019-1543 openssl: ChaCha20-Poly1305 with long nonces</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openssl is earlier than 1:1.1.1c-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193700001"/>
              <criterion comment="openssl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-devel is earlier than 1:1.1.1c-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193700003"/>
              <criterion comment="openssl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-libs is earlier than 1:1.1.1c-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193700005"/>
              <criterion comment="openssl-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-perl is earlier than 1:1.1.1c-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193700007"/>
              <criterion comment="openssl-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193701" version="636">
      <metadata>
        <title>ALSA-2019:3701: curl security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3701" ref_url="https://errata.almalinux.org/8/ALSA-2019-3701.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3701" ref_url="https://access.redhat.com/errata/RHSA-2019:3701" source="RHSA"/>
        <reference ref_id="CVE-2018-16890" ref_url="https://access.redhat.com/security/cve/CVE-2018-16890" source="CVE"/>
        <reference ref_id="CVE-2018-20483" ref_url="https://access.redhat.com/security/cve/CVE-2018-20483" source="CVE"/>
        <reference ref_id="CVE-2019-3822" ref_url="https://access.redhat.com/security/cve/CVE-2019-3822" source="CVE"/>
        <reference ref_id="CVE-2019-3823" ref_url="https://access.redhat.com/security/cve/CVE-2019-3823" source="CVE"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: NTLM type-2 heap out-of-bounds buffer read (CVE-2018-16890)

* wget: Information exposure in set_file_metadata function in xattr.c (CVE-2018-20483)

* curl: NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822)

* curl: SMTP end-of-response out-of-bounds read (CVE-2019-3823)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125-&gt;CWE-190" href="https://access.redhat.com/security/cve/CVE-2018-16890" impact="moderate" public="20190206">CVE-2018-16890</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-20483" impact="low" public="20181226">CVE-2018-20483</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-3822" impact="moderate" public="20190206">CVE-2019-3822</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-3823" impact="low" public="20190206">CVE-2019-3823</cve>
          <bugzilla href="https://bugzilla.redhat.com/1662705" id="1662705">CVE-2018-20483 wget: Information exposure in set_file_metadata function in xattr.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1670252" id="1670252">CVE-2018-16890 curl: NTLM type-2 heap out-of-bounds buffer read</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1670254" id="1670254">CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1670256" id="1670256">CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="curl is earlier than 0:7.61.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193701001"/>
              <criterion comment="curl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl is earlier than 0:7.61.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193701003"/>
              <criterion comment="libcurl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-devel is earlier than 0:7.61.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193701005"/>
              <criterion comment="libcurl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-minimal is earlier than 0:7.61.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193701007"/>
              <criterion comment="libcurl-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193702" version="635">
      <metadata>
        <title>ALSA-2019:3702: openssh security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3702" ref_url="https://errata.almalinux.org/8/ALSA-2019-3702.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3702" ref_url="https://access.redhat.com/errata/RHSA-2019:3702" source="RHSA"/>
        <reference ref_id="CVE-2018-20685" ref_url="https://access.redhat.com/security/cve/CVE-2018-20685" source="CVE"/>
        <reference ref_id="CVE-2019-6109" ref_url="https://access.redhat.com/security/cve/CVE-2019-6109" source="CVE"/>
        <reference ref_id="CVE-2019-6111" ref_url="https://access.redhat.com/security/cve/CVE-2019-6111" source="CVE"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

The following packages have been upgraded to a later upstream version: openssh (8.0p1). (BZ#1691045)

Security Fix(es):

* openssh: scp client improper directory name validation (CVE-2018-20685)

* openssh: Improper validation of object names allows malicious server to overwrite files via scp client (CVE-2019-6111)

* openssh: Missing character encoding in progress display allows for spoofing of scp client output (CVE-2019-6109)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-20685" impact="moderate" public="20181116">CVE-2018-20685</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2019-6109" impact="low" public="20181116">CVE-2019-6109</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6111" impact="moderate" public="20181116">CVE-2019-6111</cve>
          <bugzilla href="https://bugzilla.redhat.com/1665785" id="1665785">CVE-2018-20685 openssh: scp client improper directory name validation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666119" id="1666119">CVE-2019-6109 openssh: Missing character encoding in progress display allows for spoofing of scp client output</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666127" id="1666127">CVE-2019-6111 openssh: Improper validation of object names allows malicious server to overwrite files via scp client</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openssh is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702001"/>
              <criterion comment="openssh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-askpass is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702003"/>
              <criterion comment="openssh-askpass is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-cavs is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702005"/>
              <criterion comment="openssh-cavs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-clients is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702007"/>
              <criterion comment="openssh-clients is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-keycat is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702009"/>
              <criterion comment="openssh-keycat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-ldap is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702011"/>
              <criterion comment="openssh-ldap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssh-server is earlier than 0:8.0p1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702013"/>
              <criterion comment="openssh-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pam_ssh_agent_auth is earlier than 0:0.10.3-7.3.el8" test_ref="oval:org.almalinux.alsa:tst:20193702015"/>
              <criterion comment="pam_ssh_agent_auth is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193702016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193703" version="636">
      <metadata>
        <title>ALSA-2019:3703: libvorbis security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3703" ref_url="https://errata.almalinux.org/8/ALSA-2019-3703.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3703" ref_url="https://access.redhat.com/errata/RHSA-2019:3703" source="RHSA"/>
        <reference ref_id="CVE-2018-10392" ref_url="https://access.redhat.com/security/cve/CVE-2018-10392" source="CVE"/>
        <reference ref_id="CVE-2018-10393" ref_url="https://access.redhat.com/security/cve/CVE-2018-10393" source="CVE"/>
        <description>The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates.

Security Fix(es):

* libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392)

* libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2018-10392" impact="low" public="20180425">CVE-2018-10392</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2018-10393" impact="low" public="20180425">CVE-2018-10393</cve>
          <bugzilla href="https://bugzilla.redhat.com/1574193" id="1574193">CVE-2018-10392 libvorbis: heap buffer overflow in mapping0_forward function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1574194" id="1574194">CVE-2018-10393 libvorbis: stack buffer overflow in bark_noise_hybridmp function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libvorbis is earlier than 1:1.3.6-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193703001"/>
              <criterion comment="libvorbis is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193703002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvorbis-devel is earlier than 1:1.3.6-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193703003"/>
              <criterion comment="libvorbis-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193703004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvorbis-devel-docs is earlier than 1:1.3.6-2.el8" test_ref="oval:org.almalinux.alsa:tst:20193703005"/>
              <criterion comment="libvorbis-devel-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193703006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193704" version="636">
      <metadata>
        <title>ALSA-2019:3704: numpy security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3704" ref_url="https://errata.almalinux.org/8/ALSA-2019-3704.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3704" ref_url="https://access.redhat.com/errata/RHSA-2019:3704" source="RHSA"/>
        <reference ref_id="CVE-2019-6446" ref_url="https://access.redhat.com/security/cve/CVE-2019-6446" source="CVE"/>
        <description>The numpy packages provide NumPY. NumPY is an extension to the Python programming language, which adds support for large, multi-dimensional arrays and matrices, and a library of mathematical functions that operate on such arrays.

Security Fix(es):

* numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-358-&gt;CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-6446" impact="moderate" public="20190116">CVE-2019-6446</cve>
          <bugzilla href="https://bugzilla.redhat.com/1667950" id="1667950">CVE-2019-6446 numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python3-numpy is earlier than 1:1.14.3-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193704001"/>
              <criterion comment="python3-numpy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193704002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-numpy-f2py is earlier than 1:1.14.3-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193704003"/>
              <criterion comment="python3-numpy-f2py is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193704004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193705" version="636">
      <metadata>
        <title>ALSA-2019:3705: libjpeg-turbo security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3705" ref_url="https://errata.almalinux.org/8/ALSA-2019-3705.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3705" ref_url="https://access.redhat.com/errata/RHSA-2019:3705" source="RHSA"/>
        <reference ref_id="CVE-2018-14498" ref_url="https://access.redhat.com/security/cve/CVE-2018-14498" source="CVE"/>
        <description>The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.

Security Fix(es):

* libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14498" impact="moderate" public="20180720">CVE-2018-14498</cve>
          <bugzilla href="https://bugzilla.redhat.com/1687424" id="1687424">CVE-2018-14498 libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libjpeg-turbo is earlier than 0:1.5.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193705001"/>
              <criterion comment="libjpeg-turbo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193705002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libjpeg-turbo-devel is earlier than 0:1.5.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193705003"/>
              <criterion comment="libjpeg-turbo-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193705004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libjpeg-turbo-utils is earlier than 0:1.5.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193705005"/>
              <criterion comment="libjpeg-turbo-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193705006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="turbojpeg is earlier than 0:1.5.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193705007"/>
              <criterion comment="turbojpeg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193705008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="turbojpeg-devel is earlier than 0:1.5.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20193705009"/>
              <criterion comment="turbojpeg-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193705010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193706" version="636">
      <metadata>
        <title>ALSA-2019:3706: lua security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3706" ref_url="https://errata.almalinux.org/8/ALSA-2019-3706.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3706" ref_url="https://access.redhat.com/errata/RHSA-2019:3706" source="RHSA"/>
        <reference ref_id="CVE-2019-6706" ref_url="https://access.redhat.com/security/cve/CVE-2019-6706" source="CVE"/>
        <description>The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.

Security Fix(es):

* lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service (CVE-2019-6706)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-6706" impact="moderate" public="20190110">CVE-2019-6706</cve>
          <bugzilla href="https://bugzilla.redhat.com/1670019" id="1670019">CVE-2019-6706 lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="lua is earlier than 0:5.3.4-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193706001"/>
              <criterion comment="lua is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193706002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="lua-devel is earlier than 0:5.3.4-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193706003"/>
              <criterion comment="lua-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193706004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="lua-libs is earlier than 0:5.3.4-11.el8" test_ref="oval:org.almalinux.alsa:tst:20193706005"/>
              <criterion comment="lua-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193706006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193707" version="636">
      <metadata>
        <title>ALSA-2019:3707: dbus security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3707" ref_url="https://errata.almalinux.org/8/ALSA-2019-3707.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3707" ref_url="https://access.redhat.com/errata/RHSA-2019:3707" source="RHSA"/>
        <reference ref_id="CVE-2019-12749" ref_url="https://access.redhat.com/security/cve/CVE-2019-12749" source="CVE"/>
        <description>D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

* dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2019-12749" impact="moderate" public="20190611">CVE-2019-12749</cve>
          <bugzilla href="https://bugzilla.redhat.com/1719344" id="1719344">CVE-2019-12749 dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dbus is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707001"/>
              <criterion comment="dbus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-common is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707003"/>
              <criterion comment="dbus-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-daemon is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707005"/>
              <criterion comment="dbus-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-devel is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707007"/>
              <criterion comment="dbus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-libs is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707009"/>
              <criterion comment="dbus-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-tools is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707011"/>
              <criterion comment="dbus-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-x11 is earlier than 1:1.12.8-9.el8" test_ref="oval:org.almalinux.alsa:tst:20193707013"/>
              <criterion comment="dbus-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193708" version="636">
      <metadata>
        <title>ALSA-2019:3708: mariadb:10.3 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3708" ref_url="https://errata.almalinux.org/8/ALSA-2019-3708.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3708" ref_url="https://access.redhat.com/errata/RHSA-2019:3708" source="RHSA"/>
        <reference ref_id="CVE-2019-2510" ref_url="https://access.redhat.com/security/cve/CVE-2019-2510" source="CVE"/>
        <reference ref_id="CVE-2019-2537" ref_url="https://access.redhat.com/security/cve/CVE-2019-2537" source="CVE"/>
        <reference ref_id="CVE-2019-2614" ref_url="https://access.redhat.com/security/cve/CVE-2019-2614" source="CVE"/>
        <reference ref_id="CVE-2019-2627" ref_url="https://access.redhat.com/security/cve/CVE-2019-2627" source="CVE"/>
        <reference ref_id="CVE-2019-2628" ref_url="https://access.redhat.com/security/cve/CVE-2019-2628" source="CVE"/>
        <reference ref_id="CVE-2019-2737" ref_url="https://access.redhat.com/security/cve/CVE-2019-2737" source="CVE"/>
        <reference ref_id="CVE-2019-2739" ref_url="https://access.redhat.com/security/cve/CVE-2019-2739" source="CVE"/>
        <reference ref_id="CVE-2019-2740" ref_url="https://access.redhat.com/security/cve/CVE-2019-2740" source="CVE"/>
        <reference ref_id="CVE-2019-2758" ref_url="https://access.redhat.com/security/cve/CVE-2019-2758" source="CVE"/>
        <reference ref_id="CVE-2019-2805" ref_url="https://access.redhat.com/security/cve/CVE-2019-2805" source="CVE"/>
        <reference ref_id="CVE-2020-2922" ref_url="https://access.redhat.com/security/cve/CVE-2020-2922" source="CVE"/>
        <reference ref_id="CVE-2021-2007" ref_url="https://access.redhat.com/security/cve/CVE-2021-2007" source="CVE"/>
        <description>MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. 

The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358)

Security Fix(es):

* mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510)

* mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537)

* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614)

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)

* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737)

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739)

* mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740)

* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)

* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-05"/>
          <updated date="2019-11-05"/>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2510" impact="moderate" public="20190115">CVE-2019-2510</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2537" impact="moderate" public="20190115">CVE-2019-2537</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2614" impact="moderate" public="20190416">CVE-2019-2614</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2627" impact="moderate" public="20190416">CVE-2019-2627</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2628" impact="moderate" public="20190416">CVE-2019-2628</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2737" impact="moderate" public="20190716">CVE-2019-2737</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2739" impact="moderate" public="20190716">CVE-2019-2739</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2740" impact="moderate" public="20190716">CVE-2019-2740</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2758" impact="moderate" public="20190716">CVE-2019-2758</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2805" impact="moderate" public="20190716">CVE-2019-2805</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-2922" impact="moderate" public="20200414">CVE-2020-2922</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2021-2007" impact="low" public="20210119">CVE-2021-2007</cve>
          <bugzilla href="https://bugzilla.redhat.com/1666751" id="1666751">CVE-2019-2510 mysql: InnoDB unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1666763" id="1666763">CVE-2019-2537 mysql: Server: DDL unspecified vulnerability (CPU Jan 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702969" id="1702969">CVE-2019-2614 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702976" id="1702976">CVE-2019-2627 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702977" id="1702977">CVE-2019-2628 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1731997" id="1731997">CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1731999" id="1731999">CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732000" id="1732000">CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732008" id="1732008">CVE-2019-2758 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732025" id="1732025">CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835850" id="1835850">CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922382" id="1922382">CVE-2021-2007 mysql: C API unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module mariadb:10.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193708031"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:201937080011"/>
                  <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.4.0+2215+7adc332a" test_ref="oval:org.almalinux.alsa:tst:201937080012"/>
                  <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.5.0+104+3be1dd29" test_ref="oval:org.almalinux.alsa:tst:201937080013"/>
                  <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="galera is earlier than 0:25.3.26-1.module_el8.1.0+217+4d875839" test_ref="oval:org.almalinux.alsa:tst:201937080031"/>
                  <criterion comment="galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080051"/>
                  <criterion comment="mariadb is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-backup is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080071"/>
                  <criterion comment="mariadb-backup is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-common is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080091"/>
                  <criterion comment="mariadb-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-devel is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080111"/>
                  <criterion comment="mariadb-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-embedded is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080131"/>
                  <criterion comment="mariadb-embedded is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-embedded-devel is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080151"/>
                  <criterion comment="mariadb-embedded-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-errmsg is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080171"/>
                  <criterion comment="mariadb-errmsg is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-gssapi-server is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080191"/>
                  <criterion comment="mariadb-gssapi-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-oqgraph-engine is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080211"/>
                  <criterion comment="mariadb-oqgraph-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080231"/>
                  <criterion comment="mariadb-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server-galera is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080251"/>
                  <criterion comment="mariadb-server-galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server-utils is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080271"/>
                  <criterion comment="mariadb-server-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-test is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080291"/>
                  <criterion comment="mariadb-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080302"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module mariadb-devel:10.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193708051"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:201937080321"/>
                  <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="Judy-devel is earlier than 0:1.0.5-18.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:201937080331"/>
                  <criterion comment="Judy-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708034"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="asio-devel is earlier than 0:1.10.8-7.module_el8.1.0+6015+efe6ed09" test_ref="oval:org.almalinux.alsa:tst:201937080351"/>
                  <criterion comment="asio-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708036"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="asio-devel is earlier than 0:1.10.8-7.module_el8.4.0+2233+0d1461da" test_ref="oval:org.almalinux.alsa:tst:201937080352"/>
                  <criterion comment="asio-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708036"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="asio-devel is earlier than 0:1.10.8-7.module_el8.5.0+104+3be1dd29" test_ref="oval:org.almalinux.alsa:tst:201937080353"/>
                  <criterion comment="asio-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708036"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="galera is earlier than 0:25.3.26-1.module_el8.1.0+217+4d875839" test_ref="oval:org.almalinux.alsa:tst:201937080371"/>
                  <criterion comment="galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080381"/>
                  <criterion comment="mariadb is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-backup is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080391"/>
                  <criterion comment="mariadb-backup is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-common is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080401"/>
                  <criterion comment="mariadb-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-devel is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080411"/>
                  <criterion comment="mariadb-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-embedded is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080421"/>
                  <criterion comment="mariadb-embedded is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-embedded-devel is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080431"/>
                  <criterion comment="mariadb-embedded-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-errmsg is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080441"/>
                  <criterion comment="mariadb-errmsg is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-gssapi-server is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080451"/>
                  <criterion comment="mariadb-gssapi-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-oqgraph-engine is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080461"/>
                  <criterion comment="mariadb-oqgraph-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080471"/>
                  <criterion comment="mariadb-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server-galera is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080481"/>
                  <criterion comment="mariadb-server-galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-server-utils is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080491"/>
                  <criterion comment="mariadb-server-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="mariadb-test is earlier than 3:10.3.17-1.module_el8.1.0+257+48736ea6" test_ref="oval:org.almalinux.alsa:tst:201937080501"/>
                  <criterion comment="mariadb-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080302"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193735" version="635">
      <metadata>
        <title>ALSA-2019:3735: php:7.2 security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3735" ref_url="https://errata.almalinux.org/8/ALSA-2019-3735.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3735" ref_url="https://access.redhat.com/errata/RHSA-2019:3735" source="RHSA"/>
        <reference ref_id="CVE-2019-11043" ref_url="https://access.redhat.com/security/cve/CVE-2019-11043" source="CVE"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

Security Fix(es):

* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-06"/>
          <updated date="2019-11-06"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-11043" impact="critical" public="20191024">CVE-2019-11043</cve>
          <bugzilla href="https://bugzilla.redhat.com/1766378" id="1766378">CVE-2019-11043 php: underflow in env_path_info in fpm_main.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module php:7.2 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193735071"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350011"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350012"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350013"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350031"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350032"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350033"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350051"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350052"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350053"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350071"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350072"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350073"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
              <criterion comment="php is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
              <criterion comment="php-bcmath is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
              <criterion comment="php-cli is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
              <criterion comment="php-common is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
              <criterion comment="php-dba is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
              <criterion comment="php-dbg is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
              <criterion comment="php-devel is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
              <criterion comment="php-embedded is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
              <criterion comment="php-enchant is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
              <criterion comment="php-fpm is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
              <criterion comment="php-gd is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
              <criterion comment="php-gmp is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
              <criterion comment="php-intl is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
              <criterion comment="php-json is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
              <criterion comment="php-ldap is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
              <criterion comment="php-mbstring is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
              <criterion comment="php-mysqlnd is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
              <criterion comment="php-odbc is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
              <criterion comment="php-opcache is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
              <criterion comment="php-pdo is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350491"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350492"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350493"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350511"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350512"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350513"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350531"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350532"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350533"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350551"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350552"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350553"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
              <criterion comment="php-pgsql is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735057"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
              <criterion comment="php-process is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735059"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
              <criterion comment="php-recode is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735061"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
              <criterion comment="php-snmp is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735063"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
              <criterion comment="php-soap is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735065"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
              <criterion comment="php-xml is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735067"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
              <criterion comment="php-xmlrpc is earlier than 0:7.2.11-4.module+el8.1.0+4555+f5cb8e18" test_ref="oval:org.almalinux.alsa:tst:20193735069"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193736" version="636">
      <metadata>
        <title>ALSA-2019:3736: php:7.3 security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3736" ref_url="https://errata.almalinux.org/8/ALSA-2019-3736.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3736" ref_url="https://access.redhat.com/errata/RHSA-2019:3736" source="RHSA"/>
        <reference ref_id="CVE-2019-11043" ref_url="https://access.redhat.com/security/cve/CVE-2019-11043" source="CVE"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

Security Fix(es):

* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-06"/>
          <updated date="2019-11-06"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-11043" impact="critical" public="20191024">CVE-2019-11043</cve>
          <bugzilla href="https://bugzilla.redhat.com/1766378" id="1766378">CVE-2019-11043 php: underflow in env_path_info in fpm_main.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module php:7.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193736071"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360011"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360012"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360013"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360031"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360032"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360033"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360051"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360052"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360053"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360071"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360072"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360073"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
              <criterion comment="php is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
              <criterion comment="php-bcmath is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
              <criterion comment="php-cli is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
              <criterion comment="php-common is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
              <criterion comment="php-dba is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
              <criterion comment="php-dbg is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
              <criterion comment="php-devel is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
              <criterion comment="php-embedded is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
              <criterion comment="php-enchant is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
              <criterion comment="php-fpm is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
              <criterion comment="php-gd is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
              <criterion comment="php-gmp is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
              <criterion comment="php-intl is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
              <criterion comment="php-json is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
              <criterion comment="php-ldap is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
              <criterion comment="php-mbstring is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
              <criterion comment="php-mysqlnd is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
              <criterion comment="php-odbc is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
              <criterion comment="php-opcache is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
              <criterion comment="php-pdo is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360491"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360492"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360493"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360511"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360512"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360513"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360531"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360532"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360533"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360551"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360552"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360553"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
              <criterion comment="php-pgsql is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736057"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
              <criterion comment="php-process is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736059"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
              <criterion comment="php-recode is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736061"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
              <criterion comment="php-snmp is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736063"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
              <criterion comment="php-soap is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736065"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
              <criterion comment="php-xml is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736067"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
              <criterion comment="php-xmlrpc is earlier than 0:7.3.5-5.module+el8.1.0+4560+e0eee7d6" test_ref="oval:org.almalinux.alsa:tst:20193736069"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193832" version="637">
      <metadata>
        <title>ALSA-2019:3832: kernel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3832" ref_url="https://errata.almalinux.org/8/ALSA-2019-3832.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3832" ref_url="https://access.redhat.com/errata/RHSA-2019:3832" source="RHSA"/>
        <reference ref_id="CVE-2018-12207" ref_url="https://access.redhat.com/security/cve/CVE-2018-12207" source="CVE"/>
        <reference ref_id="CVE-2019-0154" ref_url="https://access.redhat.com/security/cve/CVE-2019-0154" source="CVE"/>
        <reference ref_id="CVE-2019-11135" ref_url="https://access.redhat.com/security/cve/CVE-2019-11135" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)

* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)

* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-12"/>
          <updated date="2019-11-12"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12207" impact="important" public="20191112:1800">CVE-2018-12207</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0154" impact="moderate" public="20191112:1800">CVE-2019-0154</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-11135" impact="moderate" public="20191112:1800">CVE-2019-11135</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646768" id="1646768">CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724393" id="1724393">CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1753062" id="1753062">CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-147.0.2.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193832051"/>
            <criterion comment="kernel earlier than 0:4.18.0-147.0.2.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193832052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-147.0.2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193832049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193833" version="637">
      <metadata>
        <title>ALSA-2019:3833: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3833" ref_url="https://errata.almalinux.org/8/ALSA-2019-3833.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3833" ref_url="https://access.redhat.com/errata/RHSA-2019:3833" source="RHSA"/>
        <reference ref_id="CVE-2018-12207" ref_url="https://access.redhat.com/security/cve/CVE-2018-12207" source="CVE"/>
        <reference ref_id="CVE-2019-0154" ref_url="https://access.redhat.com/security/cve/CVE-2019-0154" source="CVE"/>
        <reference ref_id="CVE-2019-11135" ref_url="https://access.redhat.com/security/cve/CVE-2019-11135" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)

* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)

* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-12"/>
          <updated date="2019-11-12"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12207" impact="important" public="20191112:1800">CVE-2018-12207</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0154" impact="moderate" public="20191112:1800">CVE-2019-0154</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-11135" impact="moderate" public="20191112:1800">CVE-2019-11135</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646768" id="1646768">CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724393" id="1724393">CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1753062" id="1753062">CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.0.2.rt24.94.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193832051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.0.2.rt24.94.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193833026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-147.0.2.rt24.94.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193833023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193870" version="635">
      <metadata>
        <title>ALSA-2019:3870: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3870" ref_url="https://errata.almalinux.org/8/ALSA-2019-3870.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3870" ref_url="https://access.redhat.com/errata/RHSA-2019:3870" source="RHSA"/>
        <reference ref_id="CVE-2019-0155" ref_url="https://access.redhat.com/security/cve/CVE-2019-0155" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-13"/>
          <updated date="2019-11-13"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0155" impact="important" public="20191112:1800">CVE-2019-0155</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724398" id="1724398">CVE-2019-0155 hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.0.3.rt24.95.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193870025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.0.3.rt24.95.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193870026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-147.0.3.rt24.95.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193870023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193871" version="635">
      <metadata>
        <title>ALSA-2019:3871: kernel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3871" ref_url="https://errata.almalinux.org/8/ALSA-2019-3871.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3871" ref_url="https://access.redhat.com/errata/RHSA-2019:3871" source="RHSA"/>
        <reference ref_id="CVE-2019-0155" ref_url="https://access.redhat.com/security/cve/CVE-2019-0155" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-13"/>
          <updated date="2019-11-13"/>
          <cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-0155" impact="important" public="20191112:1800">CVE-2019-0155</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724398" id="1724398">CVE-2019-0155 hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-147.0.3.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193870025"/>
            <criterion comment="kernel earlier than 0:4.18.0-147.0.3.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193871052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-147.0.3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193871049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193890" version="635">
      <metadata>
        <title>ALSA-2019:3890: ghostscript security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3890" ref_url="https://errata.almalinux.org/8/ALSA-2019-3890.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3890" ref_url="https://access.redhat.com/errata/RHSA-2019:3890" source="RHSA"/>
        <reference ref_id="CVE-2019-14869" ref_url="https://access.redhat.com/security/cve/CVE-2019-14869" source="CVE"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: -dSAFER escape in .charkeys (701841) (CVE-2019-14869)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-18"/>
          <updated date="2019-11-18"/>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2019-14869" impact="important" public="20191114:1300">CVE-2019-14869</cve>
          <bugzilla href="https://bugzilla.redhat.com/1768911" id="1768911">CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys (701841)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ghostscript is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890001"/>
              <criterion comment="ghostscript is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-doc is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890003"/>
              <criterion comment="ghostscript-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-dvipdf is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890005"/>
              <criterion comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-fonts is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890007"/>
              <criterion comment="ghostscript-tools-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-tools-printing is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890009"/>
              <criterion comment="ghostscript-tools-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ghostscript-x11 is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890011"/>
              <criterion comment="ghostscript-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890013"/>
              <criterion comment="libgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgs-devel is earlier than 0:9.25-5.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20193890015"/>
              <criterion comment="libgs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190971016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193936" version="638">
      <metadata>
        <title>ALSA-2019:3936: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3936" ref_url="https://errata.almalinux.org/8/ALSA-2019-3936.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3936" ref_url="https://access.redhat.com/errata/RHSA-2019:3936" source="RHSA"/>
        <reference ref_id="CVE-2018-12207" ref_url="https://access.redhat.com/security/cve/CVE-2018-12207" source="CVE"/>
        <reference ref_id="CVE-2019-11135" ref_url="https://access.redhat.com/security/cve/CVE-2019-11135" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)

* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-22"/>
          <updated date="2019-11-22"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-226" href="https://access.redhat.com/security/cve/CVE-2018-12207" impact="important" public="20191112:1800">CVE-2018-12207</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-11135" impact="moderate" public="20191112:1800">CVE-2019-11135</cve>
          <bugzilla href="https://bugzilla.redhat.com/1646768" id="1646768">CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1753062" id="1753062">CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel version 0:4.18.0-147.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193936006"/>
            <criterion comment="kernel version 0:4.18.0-147.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20193936007"/>
          </criteria>
          <criteria operator="AND">
            <criterion comment="kernel version equals 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193936001"/>
            <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            <criteria operator="OR">
              <criterion comment="kpatch-patch not installed for 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193936003"/>
              <criteria operator="AND">
                <criterion comment="kpatch-patch-4_18_0-147 is earlier than 0:1-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193936004"/>
                <criterion comment="kpatch-patch-4_18_0-147 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193936005"/>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20193951" version="635">
      <metadata>
        <title>ALSA-2019:3951: SDL security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:3951" ref_url="https://errata.almalinux.org/8/ALSA-2019-3951.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:3951" ref_url="https://access.redhat.com/errata/RHSA-2019:3951" source="RHSA"/>
        <reference ref_id="CVE-2019-13616" ref_url="https://access.redhat.com/security/cve/CVE-2019-13616" source="CVE"/>
        <description>Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.

Security Fix(es):

* SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c (CVE-2019-13616)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-11-25"/>
          <updated date="2019-11-25"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-787|CWE-125)" href="https://access.redhat.com/security/cve/CVE-2019-13616" impact="important" public="20190730">CVE-2019-13616</cve>
          <bugzilla href="https://bugzilla.redhat.com/1747237" id="1747237">CVE-2019-13616 SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="SDL is earlier than 0:1.2.15-36.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193951001"/>
              <criterion comment="SDL is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL-devel is earlier than 0:1.2.15-36.el8_1" test_ref="oval:org.almalinux.alsa:tst:20193951003"/>
              <criterion comment="SDL-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194111" version="636">
      <metadata>
        <title>ALSA-2019:4111: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4111" ref_url="https://errata.almalinux.org/8/ALSA-2019-4111.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4111" ref_url="https://access.redhat.com/errata/RHSA-2019:4111" source="RHSA"/>
        <reference ref_id="CVE-2019-17005" ref_url="https://access.redhat.com/security/cve/CVE-2019-17005" source="CVE"/>
        <reference ref_id="CVE-2019-17008" ref_url="https://access.redhat.com/security/cve/CVE-2019-17008" source="CVE"/>
        <reference ref_id="CVE-2019-17010" ref_url="https://access.redhat.com/security/cve/CVE-2019-17010" source="CVE"/>
        <reference ref_id="CVE-2019-17011" ref_url="https://access.redhat.com/security/cve/CVE-2019-17011" source="CVE"/>
        <reference ref_id="CVE-2019-17012" ref_url="https://access.redhat.com/security/cve/CVE-2019-17012" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.3.0 ESR.

Security Fix(es):

* Mozilla: Use-after-free in worker destruction (CVE-2019-17008)

* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012)

* Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005)

* Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010)

* Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-05"/>
          <updated date="2019-12-05"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17005" impact="moderate" public="20191203">CVE-2019-17005</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17008" impact="important" public="20191203">CVE-2019-17008</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17010" impact="moderate" public="20191203">CVE-2019-17010</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17011" impact="moderate" public="20191203">CVE-2019-17011</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17012" impact="important" public="20191203">CVE-2019-17012</cve>
          <bugzilla href="https://bugzilla.redhat.com/1779431" id="1779431">CVE-2019-17008 Mozilla: Use-after-free in worker destruction</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779434" id="1779434">CVE-2019-17010 Mozilla: Use-after-free when performing device orientation checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779435" id="1779435">CVE-2019-17005 Mozilla: Buffer overflow in plain text serializer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779436" id="1779436">CVE-2019-17011 Mozilla: Use-after-free when retrieving a document in antitracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779437" id="1779437">CVE-2019-17012 Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.3.0-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194111001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194114" version="635">
      <metadata>
        <title>ALSA-2019:4114: nss security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4114" ref_url="https://errata.almalinux.org/8/ALSA-2019-4114.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4114" ref_url="https://access.redhat.com/errata/RHSA-2019:4114" source="RHSA"/>
        <reference ref_id="CVE-2019-11745" ref_url="https://access.redhat.com/security/cve/CVE-2019-11745" source="CVE"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

* nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-09"/>
          <updated date="2019-12-09"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-11745" impact="important" public="20191121">CVE-2019-11745</cve>
          <bugzilla href="https://bugzilla.redhat.com/1774831" id="1774831">CVE-2019-11745 nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nss is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114001"/>
              <criterion comment="nss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-devel is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114003"/>
              <criterion comment="nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114005"/>
              <criterion comment="nss-softokn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-devel is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114007"/>
              <criterion comment="nss-softokn-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114009"/>
              <criterion comment="nss-softokn-freebl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl-devel is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114011"/>
              <criterion comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-sysinit is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114013"/>
              <criterion comment="nss-sysinit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-tools is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114015"/>
              <criterion comment="nss-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114017"/>
              <criterion comment="nss-util is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util-devel is earlier than 0:3.44.0-9.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194114019"/>
              <criterion comment="nss-util-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194195" version="635">
      <metadata>
        <title>ALSA-2019:4195: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4195" ref_url="https://errata.almalinux.org/8/ALSA-2019-4195.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4195" ref_url="https://access.redhat.com/errata/RHSA-2019:4195" source="RHSA"/>
        <reference ref_id="CVE-2019-17005" ref_url="https://access.redhat.com/security/cve/CVE-2019-17005" source="CVE"/>
        <reference ref_id="CVE-2019-17008" ref_url="https://access.redhat.com/security/cve/CVE-2019-17008" source="CVE"/>
        <reference ref_id="CVE-2019-17010" ref_url="https://access.redhat.com/security/cve/CVE-2019-17010" source="CVE"/>
        <reference ref_id="CVE-2019-17011" ref_url="https://access.redhat.com/security/cve/CVE-2019-17011" source="CVE"/>
        <reference ref_id="CVE-2019-17012" ref_url="https://access.redhat.com/security/cve/CVE-2019-17012" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.3.0.

Security Fix(es):

* Mozilla: Use-after-free in worker destruction (CVE-2019-17008)

* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012)

* Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005)

* Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010)

* Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-10"/>
          <updated date="2019-12-10"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17005" impact="moderate" public="20191203">CVE-2019-17005</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17008" impact="important" public="20191203">CVE-2019-17008</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17010" impact="moderate" public="20191203">CVE-2019-17010</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-17011" impact="moderate" public="20191203">CVE-2019-17011</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17012" impact="important" public="20191203">CVE-2019-17012</cve>
          <bugzilla href="https://bugzilla.redhat.com/1779431" id="1779431">CVE-2019-17008 Mozilla: Use-after-free in worker destruction</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779434" id="1779434">CVE-2019-17010 Mozilla: Use-after-free when performing device orientation checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779435" id="1779435">CVE-2019-17005 Mozilla: Buffer overflow in plain text serializer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779436" id="1779436">CVE-2019-17011 Mozilla: Use-after-free when retrieving a document in antitracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779437" id="1779437">CVE-2019-17012 Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.3.0-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194195001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194245" version="637">
      <metadata>
        <title>ALSA-2019:4245: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4245" ref_url="https://errata.almalinux.org/8/ALSA-2019-4245.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4245" ref_url="https://access.redhat.com/errata/RHSA-2019:4245" source="RHSA"/>
        <reference ref_id="CVE-2019-19339" ref_url="https://access.redhat.com/security/cve/CVE-2019-19339" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix:

* kpatch: hw: incomplete fix for CVE-2018-12207 (CVE-2019-19339)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-17"/>
          <updated date="2019-12-17"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-805" href="https://access.redhat.com/security/cve/CVE-2019-19339" impact="important" public="20191211">CVE-2019-19339</cve>
          <bugzilla href="https://bugzilla.redhat.com/1782199" id="1782199">CVE-2019-19339 kpatch: hw: incomplete fix for CVE-2018-12207</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel version 0:4.18.0-147.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20193936006"/>
            <criterion comment="kernel version 0:4.18.0-147.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20194245007"/>
          </criteria>
          <criteria operator="AND">
            <criterion comment="kernel version equals 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193936001"/>
            <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            <criteria operator="OR">
              <criterion comment="kpatch-patch not installed for 0:4.18.0-147.el8" test_ref="oval:org.almalinux.alsa:tst:20193936003"/>
              <criteria operator="AND">
                <criterion comment="kpatch-patch-4_18_0-147 is earlier than 0:1-4.el8" test_ref="oval:org.almalinux.alsa:tst:20194245004"/>
                <criterion comment="kpatch-patch-4_18_0-147 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193936005"/>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194269" version="637">
      <metadata>
        <title>ALSA-2019:4269: container-tools:rhel8 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4269" ref_url="https://errata.almalinux.org/8/ALSA-2019-4269.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4269" ref_url="https://access.redhat.com/errata/RHSA-2019:4269" source="RHSA"/>
        <reference ref_id="CVE-2019-16884" ref_url="https://access.redhat.com/security/cve/CVE-2019-16884" source="CVE"/>
        <reference ref_id="CVE-2019-18466" ref_url="https://access.redhat.com/security/cve/CVE-2019-18466" source="CVE"/>
        <reference ref_id="CVE-2019-9512" ref_url="https://access.redhat.com/security/cve/CVE-2019-9512" source="CVE"/>
        <reference ref_id="CVE-2019-9514" ref_url="https://access.redhat.com/security/cve/CVE-2019-9514" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)

* backport json-file logging support to 1.4.2 (BZ#1770176)

* Selinux won't allow SCTP inter pod communication (BZ#1774382)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-17"/>
          <updated date="2019-12-17"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" cwe="CWE-41" href="https://access.redhat.com/security/cve/CVE-2019-16884" impact="moderate" public="20190922">CVE-2019-16884</cve>
          <cve cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-59" href="https://access.redhat.com/security/cve/CVE-2019-18466" impact="moderate" public="20190822">CVE-2019-18466</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9512" impact="important" public="20190813:1700">CVE-2019-9512</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9514" impact="important" public="20190813:1700">CVE-2019-9514</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735645" id="1735645">CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735744" id="1735744">CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744588" id="1744588">CVE-2019-18466 podman: resolving symlink in host filesystem leads to unexpected results of copy operation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1757214" id="1757214">CVE-2019-16884 runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.9.0-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.9.0-5.module+el8.1.0+4240+893c1ab8" test_ref="oval:org.almalinux.alsa:tst:20193403003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="cockpit-podman is earlier than 0:4-1.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="container-selinux is earlier than 2:2.123.0-2.module+el8.1.0+4900+9d7326b8" test_ref="oval:org.almalinux.alsa:tst:20194269007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.1-3.module+el8.1.0+4881+045289ee" test_ref="oval:org.almalinux.alsa:tst:20194269009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:0.1.37-6.module+el8.1.0+4876+e678a192" test_ref="oval:org.almalinux.alsa:tst:20194269011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
              <criterion comment="fuse-overlayfs is earlier than 0:0.4.1-1.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.0.0+58+91b614e7" test_ref="oval:org.almalinux.alsa:tst:201934030151"/>
              <criterion comment="oci-systemd-hook is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.0.0+194+ac560166" test_ref="oval:org.almalinux.alsa:tst:201934030171"/>
              <criterion comment="oci-umount is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.4.2-6.module+el8.1.0+4830+f49150d7" test_ref="oval:org.almalinux.alsa:tst:20194269019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.4.2-6.module+el8.1.0+4830+f49150d7" test_ref="oval:org.almalinux.alsa:tst:20194269021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-manpages is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403024"/>
              <criterion comment="podman-manpages is earlier than 0:1.4.2-6.module+el8.1.0+4830+f49150d7" test_ref="oval:org.almalinux.alsa:tst:20194269023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.4.2-6.module+el8.1.0+4830+f49150d7" test_ref="oval:org.almalinux.alsa:tst:20194269025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.4.2-6.module+el8.1.0+4830+f49150d7" test_ref="oval:org.almalinux.alsa:tst:20194269027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af" test_ref="oval:org.almalinux.alsa:tst:20193403029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
              <criterion comment="runc is earlier than 0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241" test_ref="oval:org.almalinux.alsa:tst:20194269031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:0.1.37-6.module+el8.1.0+4876+e678a192" test_ref="oval:org.almalinux.alsa:tst:20194269033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
              <criterion comment="skopeo-tests is earlier than 1:0.1.37-6.module+el8.1.0+4876+e678a192" test_ref="oval:org.almalinux.alsa:tst:20194269035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:0.3.0-4.module+el8.1.0+4306+1d917805" test_ref="oval:org.almalinux.alsa:tst:20193403037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.4-1.module_el8.1.0+293+ad8ef41f" test_ref="oval:org.almalinux.alsa:tst:201934030391"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194273" version="636">
      <metadata>
        <title>ALSA-2019:4273: container-tools:1.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4273" ref_url="https://errata.almalinux.org/8/ALSA-2019-4273.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4273" ref_url="https://access.redhat.com/errata/RHSA-2019:4273" source="RHSA"/>
        <reference ref_id="CVE-2019-9512" ref_url="https://access.redhat.com/security/cve/CVE-2019-9512" source="CVE"/>
        <reference ref_id="CVE-2019-9514" ref_url="https://access.redhat.com/security/cve/CVE-2019-9514" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-17"/>
          <updated date="2019-12-17"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9512" impact="important" public="20190813:1700">CVE-2019-9512</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9514" impact="important" public="20190813:1700">CVE-2019-9514</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735645" id="1735645">CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735744" id="1735744">CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:1.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193494025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-6.gite94b4f9.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:201942730011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.94-1.git1e99f1d.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:201934940031"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730051"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730052"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730053"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730071"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730072"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730073"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940091"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940092"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940093"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940111"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940112"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940113"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940131"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940132"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940133"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:201942730151"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:201942730171"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730191"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730192"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730193"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730211"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730212"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730213"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48" test_ref="oval:org.almalinux.alsa:tst:20193494023"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194356" version="638">
      <metadata>
        <title>ALSA-2019:4356: git security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4356" ref_url="https://errata.almalinux.org/8/ALSA-2019-4356.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4356" ref_url="https://access.redhat.com/errata/RHSA-2019:4356" source="RHSA"/>
        <reference ref_id="CVE-2019-1348" ref_url="https://access.redhat.com/security/cve/CVE-2019-1348" source="CVE"/>
        <reference ref_id="CVE-2019-1349" ref_url="https://access.redhat.com/security/cve/CVE-2019-1349" source="CVE"/>
        <reference ref_id="CVE-2019-1352" ref_url="https://access.redhat.com/security/cve/CVE-2019-1352" source="CVE"/>
        <reference ref_id="CVE-2019-1387" ref_url="https://access.redhat.com/security/cve/CVE-2019-1387" source="CVE"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

The following packages have been upgraded to a later upstream version: git (2.18.2). (BZ#1784058)

Security Fix(es):

* git: Remote code execution in recursive clones with nested submodules (CVE-2019-1387)

* git: Arbitrary path overwriting via export-marks in-stream command feature (CVE-2019-1348)

* git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/ (CVE-2019-1349)

* git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams (CVE-2019-1352)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-19"/>
          <updated date="2019-12-19"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-1348" impact="moderate" public="20191210">CVE-2019-1348</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-1349" impact="moderate" public="20191210">CVE-2019-1349</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-73" href="https://access.redhat.com/security/cve/CVE-2019-1352" impact="low" public="20191210">CVE-2019-1352</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-1387" impact="important" public="20191210">CVE-2019-1387</cve>
          <bugzilla href="https://bugzilla.redhat.com/1781127" id="1781127">CVE-2019-1387 git: Remote code execution in recursive clones with nested submodules</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781143" id="1781143">CVE-2019-1349 git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781953" id="1781953">CVE-2019-1348 git: Arbitrary path overwriting via export-marks in-stream command feature</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781963" id="1781963">CVE-2019-1352 git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="git is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356001"/>
              <criterion comment="git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-all is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356003"/>
              <criterion comment="git-all is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356005"/>
              <criterion comment="git-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core-doc is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356007"/>
              <criterion comment="git-core-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-daemon is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356009"/>
              <criterion comment="git-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-email is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356011"/>
              <criterion comment="git-email is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-gui is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356013"/>
              <criterion comment="git-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-instaweb is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356015"/>
              <criterion comment="git-instaweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-subtree is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356017"/>
              <criterion comment="git-subtree is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-svn is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356019"/>
              <criterion comment="git-svn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitk is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356021"/>
              <criterion comment="gitk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitweb is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356023"/>
              <criterion comment="gitweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356025"/>
              <criterion comment="perl-Git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git-SVN is earlier than 0:2.18.2-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194356027"/>
              <criterion comment="perl-Git-SVN is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356028"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194360" version="638">
      <metadata>
        <title>ALSA-2019:4360: libyang security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4360" ref_url="https://errata.almalinux.org/8/ALSA-2019-4360.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4360" ref_url="https://access.redhat.com/errata/RHSA-2019:4360" source="RHSA"/>
        <reference ref_id="CVE-2019-19333" ref_url="https://access.redhat.com/security/cve/CVE-2019-19333" source="CVE"/>
        <reference ref_id="CVE-2019-19334" ref_url="https://access.redhat.com/security/cve/CVE-2019-19334" source="CVE"/>
        <description>The libyang package provides a library for YANG data modeling language. libyang is a YANG data modelling language parser and toolkit written (and providing API) in C. The library is used e.g. in libnetconf2, Netopeer2, sysrepo and FRRouting projects.

Security Fix(es):

* libyang: stack-based buffer overflow in make_canonical when bits leaf type is used (CVE-2019-19333)

* libyang: stack-based buffer overflow in make_canonical when identityref leaf type is used (CVE-2019-19334)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

IMPORTANT:

The libyang-devel sub-package has recently been removed from the AppStream repository. If you have previously installed libyang-devel, remove it prior to applying this advisory to make the update successful.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-23"/>
          <updated date="2019-12-23"/>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-19333" impact="important" public="20191205">CVE-2019-19333</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-19334" impact="important" public="20191205">CVE-2019-19334</cve>
          <bugzilla href="https://bugzilla.redhat.com/1779573" id="1779573">CVE-2019-19333 libyang: stack-based buffer overflow in make_canonical when bits leaf type is used</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779576" id="1779576">CVE-2019-19334 libyang: stack-based buffer overflow in make_canonical when identityref leaf type is used</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="libyang is earlier than 0:0.16.105-3.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20194360001"/>
          <criterion comment="libyang is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211906002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20194361" version="637">
      <metadata>
        <title>ALSA-2019:4361: fribidi security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2019:4361" ref_url="https://errata.almalinux.org/8/ALSA-2019-4361.html" source="ALSA"/>
        <reference ref_id="RHSA-2019:4361" ref_url="https://access.redhat.com/errata/RHSA-2019:4361" source="RHSA"/>
        <reference ref_id="CVE-2019-18397" ref_url="https://access.redhat.com/security/cve/CVE-2019-18397" source="CVE"/>
        <description>A library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.

Security Fix(es):

* fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2019 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2019-12-23"/>
          <updated date="2019-12-23"/>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-18397" impact="important" public="20191107">CVE-2019-18397</cve>
          <bugzilla href="https://bugzilla.redhat.com/1768750" id="1768750">CVE-2019-18397 fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="fribidi is earlier than 0:1.0.4-7.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194361001"/>
              <criterion comment="fribidi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194361002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fribidi-devel is earlier than 0:1.0.4-7.el8_1" test_ref="oval:org.almalinux.alsa:tst:20194361003"/>
              <criterion comment="fribidi-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194361004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200046" version="636">
      <metadata>
        <title>ALSA-2020:0046: java-1.8.0-ibm security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0046" ref_url="https://errata.almalinux.org/8/ALSA-2020-0046.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0046" ref_url="https://access.redhat.com/errata/RHSA-2020:0046" source="RHSA"/>
        <reference ref_id="CVE-2019-17631" ref_url="https://access.redhat.com/security/cve/CVE-2019-17631" source="CVE"/>
        <reference ref_id="CVE-2019-2945" ref_url="https://access.redhat.com/security/cve/CVE-2019-2945" source="CVE"/>
        <reference ref_id="CVE-2019-2962" ref_url="https://access.redhat.com/security/cve/CVE-2019-2962" source="CVE"/>
        <reference ref_id="CVE-2019-2964" ref_url="https://access.redhat.com/security/cve/CVE-2019-2964" source="CVE"/>
        <reference ref_id="CVE-2019-2973" ref_url="https://access.redhat.com/security/cve/CVE-2019-2973" source="CVE"/>
        <reference ref_id="CVE-2019-2975" ref_url="https://access.redhat.com/security/cve/CVE-2019-2975" source="CVE"/>
        <reference ref_id="CVE-2019-2978" ref_url="https://access.redhat.com/security/cve/CVE-2019-2978" source="CVE"/>
        <reference ref_id="CVE-2019-2981" ref_url="https://access.redhat.com/security/cve/CVE-2019-2981" source="CVE"/>
        <reference ref_id="CVE-2019-2983" ref_url="https://access.redhat.com/security/cve/CVE-2019-2983" source="CVE"/>
        <reference ref_id="CVE-2019-2988" ref_url="https://access.redhat.com/security/cve/CVE-2019-2988" source="CVE"/>
        <reference ref_id="CVE-2019-2989" ref_url="https://access.redhat.com/security/cve/CVE-2019-2989" source="CVE"/>
        <reference ref_id="CVE-2019-2992" ref_url="https://access.redhat.com/security/cve/CVE-2019-2992" source="CVE"/>
        <reference ref_id="CVE-2019-2996" ref_url="https://access.redhat.com/security/cve/CVE-2019-2996" source="CVE"/>
        <reference ref_id="CVE-2019-2999" ref_url="https://access.redhat.com/security/cve/CVE-2019-2999" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6.

Security Fix(es):

* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)

* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)

* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)

* Oracle JDK: unspecified vulnerability fixed in 8u221 (Deployment) (CVE-2019-2996)

* IBM JDK: Unrestricted access to diagnostic operations (CVE-2019-17631)

* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)

* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)

* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)

* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)

* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)

* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)

* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)

* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)

* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-07"/>
          <updated date="2020-01-07"/>
          <cve cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2019-17631" impact="moderate" public="20191204">CVE-2019-17631</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2945" impact="low" public="20191015">CVE-2019-2945</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-2962" impact="low" public="20191015">CVE-2019-2962</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2964" impact="low" public="20191015">CVE-2019-2964</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2973" impact="low" public="20191015">CVE-2019-2973</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2975" impact="moderate" public="20191015">CVE-2019-2975</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-2978" impact="moderate" public="20191015">CVE-2019-2978</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2981" impact="low" public="20191015">CVE-2019-2981</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2019-2983" impact="low" public="20191015">CVE-2019-2983</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-2988" impact="low" public="20191015">CVE-2019-2988</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2989" impact="moderate" public="20191015">CVE-2019-2989</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-2992" impact="low" public="20191015">CVE-2019-2992</cve>
          <cve cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2996" impact="moderate" public="20191015">CVE-2019-2996</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-2999" impact="low" public="20191015">CVE-2019-2999</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760963" id="1760963">CVE-2019-2964 OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760969" id="1760969">CVE-2019-2975 OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760978" id="1760978">CVE-2019-2973 OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760980" id="1760980">CVE-2019-2981 OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760992" id="1760992">CVE-2019-2999 OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760999" id="1760999">CVE-2019-2988 OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761006" id="1761006">CVE-2019-2978 OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761146" id="1761146">CVE-2019-2992 OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761262" id="1761262">CVE-2019-2983 OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761266" id="1761266">CVE-2019-2962 OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761596" id="1761596">CVE-2019-2945 OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1761601" id="1761601">CVE-2019-2989 OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1778942" id="1778942">CVE-2019-2996 Oracle JDK: unspecified vulnerability fixed in 8u221 (Deployment)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779880" id="1779880">CVE-2019-17631 IBM JDK: Unrestricted access to diagnostic operations</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.0-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200046015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200111" version="639">
      <metadata>
        <title>ALSA-2020:0111: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0111" ref_url="https://errata.almalinux.org/8/ALSA-2020-0111.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0111" ref_url="https://access.redhat.com/errata/RHSA-2020:0111" source="RHSA"/>
        <reference ref_id="CVE-2019-17016" ref_url="https://access.redhat.com/security/cve/CVE-2019-17016" source="CVE"/>
        <reference ref_id="CVE-2019-17017" ref_url="https://access.redhat.com/security/cve/CVE-2019-17017" source="CVE"/>
        <reference ref_id="CVE-2019-17022" ref_url="https://access.redhat.com/security/cve/CVE-2019-17022" source="CVE"/>
        <reference ref_id="CVE-2019-17024" ref_url="https://access.redhat.com/security/cve/CVE-2019-17024" source="CVE"/>
        <reference ref_id="CVE-2019-17026" ref_url="https://access.redhat.com/security/cve/CVE-2019-17026" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.4.1 ESR.

Security Fix(es):

* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026)

* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016)

* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017)

* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024)

* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-14"/>
          <updated date="2020-01-14"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-17016" impact="important" public="20200107">CVE-2019-17016</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-17017" impact="important" public="20200107">CVE-2019-17017</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-17022" impact="moderate" public="20200107">CVE-2019-17022</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17024" impact="important" public="20200107">CVE-2019-17024</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-17026" impact="critical" public="20200108">CVE-2019-17026</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788723" id="1788723">CVE-2019-17016 Mozilla: Bypass of @namespace CSS sanitization during pasting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788724" id="1788724">CVE-2019-17017 Mozilla: Type Confusion in XPCVariant.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788726" id="1788726">CVE-2019-17022 Mozilla: CSS sanitization does not escape HTML tags</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788727" id="1788727">CVE-2019-17024 Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789214" id="1789214">CVE-2019-17026 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.4.1-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200111001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200127" version="635">
      <metadata>
        <title>ALSA-2020:0127: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0127" ref_url="https://errata.almalinux.org/8/ALSA-2020-0127.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0127" ref_url="https://access.redhat.com/errata/RHSA-2020:0127" source="RHSA"/>
        <reference ref_id="CVE-2019-17016" ref_url="https://access.redhat.com/security/cve/CVE-2019-17016" source="CVE"/>
        <reference ref_id="CVE-2019-17017" ref_url="https://access.redhat.com/security/cve/CVE-2019-17017" source="CVE"/>
        <reference ref_id="CVE-2019-17022" ref_url="https://access.redhat.com/security/cve/CVE-2019-17022" source="CVE"/>
        <reference ref_id="CVE-2019-17024" ref_url="https://access.redhat.com/security/cve/CVE-2019-17024" source="CVE"/>
        <reference ref_id="CVE-2019-17026" ref_url="https://access.redhat.com/security/cve/CVE-2019-17026" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.4.1.

Security Fix(es):

* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026)

* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016)

* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017)

* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024)

* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-16"/>
          <updated date="2020-01-16"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-17016" impact="important" public="20200107">CVE-2019-17016</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-17017" impact="important" public="20200107">CVE-2019-17017</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-17022" impact="moderate" public="20200107">CVE-2019-17022</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17024" impact="important" public="20200107">CVE-2019-17024</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2019-17026" impact="critical" public="20200108">CVE-2019-17026</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788723" id="1788723">CVE-2019-17016 Mozilla: Bypass of @namespace CSS sanitization during pasting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788724" id="1788724">CVE-2019-17017 Mozilla: Type Confusion in XPCVariant.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788726" id="1788726">CVE-2019-17022 Mozilla: CSS sanitization does not escape HTML tags</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788727" id="1788727">CVE-2019-17024 Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789214" id="1789214">CVE-2019-17026 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.4.1-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200127001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200128" version="635">
      <metadata>
        <title>ALSA-2020:0128: java-11-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0128" ref_url="https://errata.almalinux.org/8/ALSA-2020-0128.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0128" ref_url="https://access.redhat.com/errata/RHSA-2020:0128" source="RHSA"/>
        <reference ref_id="CVE-2020-2583" ref_url="https://access.redhat.com/security/cve/CVE-2020-2583" source="CVE"/>
        <reference ref_id="CVE-2020-2590" ref_url="https://access.redhat.com/security/cve/CVE-2020-2590" source="CVE"/>
        <reference ref_id="CVE-2020-2593" ref_url="https://access.redhat.com/security/cve/CVE-2020-2593" source="CVE"/>
        <reference ref_id="CVE-2020-2601" ref_url="https://access.redhat.com/security/cve/CVE-2020-2601" source="CVE"/>
        <reference ref_id="CVE-2020-2604" ref_url="https://access.redhat.com/security/cve/CVE-2020-2604" source="CVE"/>
        <reference ref_id="CVE-2020-2654" ref_url="https://access.redhat.com/security/cve/CVE-2020-2654" source="CVE"/>
        <reference ref_id="CVE-2020-2655" ref_url="https://access.redhat.com/security/cve/CVE-2020-2655" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601)

* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604)

* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)

* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593)

* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)

* OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655)

* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-16"/>
          <updated date="2020-01-16"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2583" impact="low" public="20200114">CVE-2020-2583</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2590" impact="moderate" public="20200114">CVE-2020-2590</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2020-2593" impact="moderate" public="20200114">CVE-2020-2593</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-2601" impact="important" public="20200114">CVE-2020-2601</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-2604" impact="important" public="20200114">CVE-2020-2604</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2654" impact="moderate" public="20200114">CVE-2020-2654</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-841" href="https://access.redhat.com/security/cve/CVE-2020-2655" impact="moderate" public="20200114">CVE-2020-2655</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790444" id="1790444">CVE-2020-2583 OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790556" id="1790556">CVE-2020-2590 OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790570" id="1790570">CVE-2020-2601 OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790884" id="1790884">CVE-2020-2593 OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790944" id="1790944">CVE-2020-2604 OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790951" id="1790951">CVE-2020-2655 OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791217" id="1791217">CVE-2020-2654 OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.6.10-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200128015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200130" version="641">
      <metadata>
        <title>ALSA-2020:0130: .NET Core on AlmaLinux security and bug fix update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0130" ref_url="https://errata.almalinux.org/8/ALSA-2020-0130.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0130" ref_url="https://access.redhat.com/errata/RHSA-2020:0130" source="RHSA"/>
        <reference ref_id="CVE-2020-0602" ref_url="https://access.redhat.com/security/cve/CVE-2020-0602" source="CVE"/>
        <reference ref_id="CVE-2020-0603" ref_url="https://access.redhat.com/security/cve/CVE-2020-0603" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102 and .NET Core Runtime 3.0.2.

Security Fixes:

* dotnet: Memory Corruption in SignalR (CVE-2020-0603)

* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-16"/>
          <updated date="2020-01-16"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-0602" impact="important" public="20200114">CVE-2020-0602</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-0603" impact="critical" public="20200114">CVE-2020-0603</cve>
          <bugzilla href="https://bugzilla.redhat.com/1789623" id="1789623">CVE-2020-0602 dotnet: Denial of service via backpressure issue</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789624" id="1789624">CVE-2020-0603 dotnet: Memory Corruption in SignalR</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130001"/>
              <criterion comment="aspnetcore-runtime-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130003"/>
              <criterion comment="aspnetcore-targeting-pack-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.0.102-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130007"/>
              <criterion comment="dotnet-apphost-pack-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130011"/>
              <criterion comment="dotnet-hostfxr-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130013"/>
              <criterion comment="dotnet-runtime-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.0 is earlier than 0:3.0.102-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130015"/>
              <criterion comment="dotnet-sdk-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.0 is earlier than 0:3.0.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130017"/>
              <criterion comment="dotnet-targeting-pack-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.0 is earlier than 0:3.0.102-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130019"/>
              <criterion comment="dotnet-templates-3.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.0.102-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200130021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200201" version="635">
      <metadata>
        <title>ALSA-2020:0201: python-reportlab security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0201" ref_url="https://errata.almalinux.org/8/ALSA-2020-0201.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0201" ref_url="https://access.redhat.com/errata/RHSA-2020:0201" source="RHSA"/>
        <reference ref_id="CVE-2019-17626" ref_url="https://access.redhat.com/security/cve/CVE-2019-17626" source="CVE"/>
        <description>Python-reportlab is a library used for generation of PDF documents.

Security Fix(es):

* python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-24"/>
          <updated date="2020-01-24"/>
          <cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-95" href="https://access.redhat.com/security/cve/CVE-2019-17626" impact="important" public="20191016">CVE-2019-17626</cve>
          <bugzilla href="https://bugzilla.redhat.com/1769661" id="1769661">CVE-2019-17626 python-reportlab: code injection in colors.py allows attacker to execute code</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="python3-reportlab is earlier than 0:3.4.0-6.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200201001"/>
          <criterion comment="python3-reportlab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200201002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200202" version="635">
      <metadata>
        <title>ALSA-2020:0202: java-1.8.0-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0202" ref_url="https://errata.almalinux.org/8/ALSA-2020-0202.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0202" ref_url="https://access.redhat.com/errata/RHSA-2020:0202" source="RHSA"/>
        <reference ref_id="CVE-2020-2583" ref_url="https://access.redhat.com/security/cve/CVE-2020-2583" source="CVE"/>
        <reference ref_id="CVE-2020-2590" ref_url="https://access.redhat.com/security/cve/CVE-2020-2590" source="CVE"/>
        <reference ref_id="CVE-2020-2593" ref_url="https://access.redhat.com/security/cve/CVE-2020-2593" source="CVE"/>
        <reference ref_id="CVE-2020-2601" ref_url="https://access.redhat.com/security/cve/CVE-2020-2601" source="CVE"/>
        <reference ref_id="CVE-2020-2604" ref_url="https://access.redhat.com/security/cve/CVE-2020-2604" source="CVE"/>
        <reference ref_id="CVE-2020-2654" ref_url="https://access.redhat.com/security/cve/CVE-2020-2654" source="CVE"/>
        <reference ref_id="CVE-2020-2659" ref_url="https://access.redhat.com/security/cve/CVE-2020-2659" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601)

* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604)

* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)

* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593)

* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)

* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-24"/>
          <updated date="2020-01-24"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2583" impact="low" public="20200114">CVE-2020-2583</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2590" impact="moderate" public="20200114">CVE-2020-2590</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2020-2593" impact="moderate" public="20200114">CVE-2020-2593</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-2601" impact="important" public="20200114">CVE-2020-2601</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-2604" impact="important" public="20200114">CVE-2020-2604</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2654" impact="moderate" public="20200114">CVE-2020-2654</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2659" impact="low" public="20200114">CVE-2020-2659</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790444" id="1790444">CVE-2020-2583 OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790556" id="1790556">CVE-2020-2590 OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790570" id="1790570">CVE-2020-2601 OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790884" id="1790884">CVE-2020-2593 OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790944" id="1790944">CVE-2020-2604 OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791217" id="1791217">CVE-2020-2654 OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791284" id="1791284">CVE-2020-2659 OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.242.b08-0.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200202015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200271" version="635">
      <metadata>
        <title>ALSA-2020:0271: libarchive security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0271" ref_url="https://errata.almalinux.org/8/ALSA-2020-0271.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0271" ref_url="https://access.redhat.com/errata/RHSA-2020:0271" source="RHSA"/>
        <reference ref_id="CVE-2019-18408" ref_url="https://access.redhat.com/security/cve/CVE-2019-18408" source="CVE"/>
        <description>The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.

Security Fix(es):

* libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry (CVE-2019-18408)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-29"/>
          <updated date="2020-01-29"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-18408" impact="important" public="20190510">CVE-2019-18408</cve>
          <bugzilla href="https://bugzilla.redhat.com/1769979" id="1769979">CVE-2019-18408 libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bsdtar is earlier than 0:3.3.2-8.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200271001"/>
              <criterion comment="bsdtar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive is earlier than 0:3.3.2-8.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200271003"/>
              <criterion comment="libarchive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive-devel is earlier than 0:3.3.2-8.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200271005"/>
              <criterion comment="libarchive-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200273" version="635">
      <metadata>
        <title>ALSA-2020:0273: sqlite security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0273" ref_url="https://errata.almalinux.org/8/ALSA-2020-0273.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0273" ref_url="https://access.redhat.com/errata/RHSA-2020:0273" source="RHSA"/>
        <reference ref_id="CVE-2019-13734" ref_url="https://access.redhat.com/security/cve/CVE-2019-13734" source="CVE"/>
        <description>SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: fts3: improve shadow table corruption detection (CVE-2019-13734)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-29"/>
          <updated date="2020-01-29"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-13734" impact="important" public="20191210">CVE-2019-13734</cve>
          <bugzilla href="https://bugzilla.redhat.com/1781980" id="1781980">CVE-2019-13734 sqlite: fts3: improve shadow table corruption detection</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="lemon is earlier than 0:3.26.0-4.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200273001"/>
              <criterion comment="lemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite is earlier than 0:3.26.0-4.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200273003"/>
              <criterion comment="sqlite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-devel is earlier than 0:3.26.0-4.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200273005"/>
              <criterion comment="sqlite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-doc is earlier than 0:3.26.0-4.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200273007"/>
              <criterion comment="sqlite-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-libs is earlier than 0:3.26.0-4.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200273009"/>
              <criterion comment="sqlite-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200274" version="635">
      <metadata>
        <title>ALSA-2020:0274: openjpeg2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0274" ref_url="https://errata.almalinux.org/8/ALSA-2020-0274.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0274" ref_url="https://access.redhat.com/errata/RHSA-2020:0274" source="RHSA"/>
        <reference ref_id="CVE-2020-6851" ref_url="https://access.redhat.com/security/cve/CVE-2020-6851" source="CVE"/>
        <description>OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.

Security Fix(es):

* openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() (CVE-2020-6851)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-29"/>
          <updated date="2020-01-29"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-6851" impact="important" public="20200113">CVE-2020-6851</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790511" id="1790511">CVE-2020-6851 openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openjpeg2 is earlier than 0:2.3.1-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200274001"/>
              <criterion comment="openjpeg2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel is earlier than 0:2.3.1-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200274003"/>
              <criterion comment="openjpeg2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel-docs is earlier than 0:2.3.1-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200274005"/>
              <criterion comment="openjpeg2-devel-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-tools is earlier than 0:2.3.1-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200274007"/>
              <criterion comment="openjpeg2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200279" version="636">
      <metadata>
        <title>ALSA-2020:0279: virt:rhel security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0279" ref_url="https://errata.almalinux.org/8/ALSA-2020-0279.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0279" ref_url="https://access.redhat.com/errata/RHSA-2020:0279" source="RHSA"/>
        <reference ref_id="CVE-2019-11135" ref_url="https://access.redhat.com/security/cve/CVE-2019-11135" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-01-29"/>
          <updated date="2020-01-29"/>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-226-&gt;CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-11135" impact="moderate" public="20191112:1800">CVE-2019-11135</cve>
          <bugzilla href="https://bugzilla.redhat.com/1753062" id="1753062">CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20171214-6.gitfa98132.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450011"/>
                  <criterion comment="SLOF is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450031"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450051"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450071"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450091"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450111"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450131"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450151"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450171"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450231"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450251"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450271"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450331"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450351"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450371"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450391"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450411"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450431"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279051"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279053"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279055"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279057"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279059"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279061"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279063"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279065"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279067"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279069"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279071"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279073"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279075"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279077"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279079"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279081"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279083"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279085"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279087"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279089"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279091"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279093"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279095"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450971"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279099"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279101"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279103"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279105"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279107"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451091"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451111"/>
                  <criterion comment="nbdkit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451131"/>
                  <criterion comment="nbdkit-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751162"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451151"/>
                  <criterion comment="nbdkit-basic-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451171"/>
                  <criterion comment="nbdkit-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451191"/>
                  <criterion comment="nbdkit-example-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451211"/>
                  <criterion comment="nbdkit-plugin-gzip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451231"/>
                  <criterion comment="nbdkit-plugin-python-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451251"/>
                  <criterion comment="nbdkit-plugin-python3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451271"/>
                  <criterion comment="nbdkit-plugin-vddk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751302"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451291"/>
                  <criterion comment="nbdkit-plugin-xz is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751322"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451371"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451391"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451411"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451431"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451451"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451471"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791491"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791511"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791531"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791551"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791571"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791591"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791611"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791631"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791651"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002791671"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451691"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451711"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451731"/>
                  <criterion comment="seabios is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451751"/>
                  <criterion comment="seabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751782"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451771"/>
                  <criterion comment="seavgabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751802"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451831"/>
                  <criterion comment="supermin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451851"/>
                  <criterion comment="supermin-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451871"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451891"/>
                  <criterion comment="virt-p2v-maker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451911"/>
                  <criterion comment="virt-v2v is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751942"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451941"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451951"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451961"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279200"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279201"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279203"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279204"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279205"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279206"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279207"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279208"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279209"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279210"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279211"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279212"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279213"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279214"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279215"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279216"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279217"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279218"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279219"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452201"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279221"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279223"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730" test_ref="oval:org.almalinux.alsa:tst:20200279224"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452281"/>
                  <criterion comment="ocaml-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452292"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452301"/>
                  <criterion comment="ocaml-hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452312"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452321"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452341"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452361"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452371"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452381"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452391"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202002792401"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452421"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200328" version="636">
      <metadata>
        <title>ALSA-2020:0328: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0328" ref_url="https://errata.almalinux.org/8/ALSA-2020-0328.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0328" ref_url="https://access.redhat.com/errata/RHSA-2020:0328" source="RHSA"/>
        <reference ref_id="CVE-2019-14814" ref_url="https://access.redhat.com/security/cve/CVE-2019-14814" source="CVE"/>
        <reference ref_id="CVE-2019-14815" ref_url="https://access.redhat.com/security/cve/CVE-2019-14815" source="CVE"/>
        <reference ref_id="CVE-2019-14816" ref_url="https://access.redhat.com/security/cve/CVE-2019-14816" source="CVE"/>
        <reference ref_id="CVE-2019-14895" ref_url="https://access.redhat.com/security/cve/CVE-2019-14895" source="CVE"/>
        <reference ref_id="CVE-2019-14898" ref_url="https://access.redhat.com/security/cve/CVE-2019-14898" source="CVE"/>
        <reference ref_id="CVE-2019-14901" ref_url="https://access.redhat.com/security/cve/CVE-2019-14901" source="CVE"/>
        <reference ref_id="CVE-2019-17666" ref_url="https://access.redhat.com/security/cve/CVE-2019-17666" source="CVE"/>
        <reference ref_id="CVE-2019-19338" ref_url="https://access.redhat.com/security/cve/CVE-2019-19338" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)

* kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895)

* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)

* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)

* kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS (CVE-2019-14814)

* kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS (CVE-2019-14815)

* kernel: incomplete fix  for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898)

* Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) (CVE-2019-19338)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.1.z2 source tree (BZ#1780326)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14814" impact="moderate" public="20190828:1000">CVE-2019-14814</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14815" impact="moderate" public="20190828:1000">CVE-2019-14815</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14816" impact="important" public="20190828:1000">CVE-2019-14816</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14895" impact="important" public="20191125:0829">CVE-2019-14895</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362-&gt;CWE-667" href="https://access.redhat.com/security/cve/CVE-2019-14898" impact="moderate" public="20191120">CVE-2019-14898</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-400|CWE-122)" href="https://access.redhat.com/security/cve/CVE-2019-14901" impact="important" public="20191122">CVE-2019-14901</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17666" impact="important" public="20191018">CVE-2019-17666</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-19338" impact="moderate" public="20191118">CVE-2019-19338</cve>
          <bugzilla href="https://bugzilla.redhat.com/1744130" id="1744130">CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744137" id="1744137">CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744149" id="1744149">CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763690" id="1763690">CVE-2019-17666 kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1773519" id="1773519">CVE-2019-14901 kernel: heap overflow in marvell/mwifiex/tdls.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774671" id="1774671">CVE-2019-14898 kernel: incomplete fix  for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774870" id="1774870">CVE-2019-14895 kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781514" id="1781514">CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.5.1.rt24.98.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20200328025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.5.1.rt24.98.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20200328026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-147.5.1.rt24.98.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200328023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200329" version="636">
      <metadata>
        <title>ALSA-2020:0329: go-toolset:rhel8 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0329" ref_url="https://errata.almalinux.org/8/ALSA-2020-0329.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0329" ref_url="https://access.redhat.com/errata/RHSA-2020:0329" source="RHSA"/>
        <reference ref_id="CVE-2019-16276" ref_url="https://access.redhat.com/security/cve/CVE-2019-16276" source="CVE"/>
        <reference ref_id="CVE-2019-17596" ref_url="https://access.redhat.com/security/cve/CVE-2019-17596" source="CVE"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)

* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-16276" impact="moderate" public="20190925">CVE-2019-16276</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-17596" impact="moderate" public="20191017">CVE-2019-17596</cve>
          <bugzilla href="https://bugzilla.redhat.com/1755969" id="1755969">CVE-2019-16276 golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763310" id="1763310">CVE-2019-17596 golang: invalid public key causes panic in dsa.Verify</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="go-toolset is earlier than 0:1.12.12-2.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290011"/>
              <criterion comment="go-toolset is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290031"/>
              <criterion comment="golang is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290051"/>
              <criterion comment="golang-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290071"/>
              <criterion comment="golang-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290091"/>
              <criterion comment="golang-misc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190102"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290111"/>
              <criterion comment="golang-race is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290131"/>
              <criterion comment="golang-src is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is earlier than 0:1.12.12-4.module_el8.1.0+271+e71148fc" test_ref="oval:org.almalinux.alsa:tst:202003290151"/>
              <criterion comment="golang-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190162"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200335" version="635">
      <metadata>
        <title>ALSA-2020:0335: grub2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0335" ref_url="https://errata.almalinux.org/8/ALSA-2020-0335.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0335" ref_url="https://access.redhat.com/errata/RHSA-2020:0335" source="RHSA"/>
        <reference ref_id="CVE-2019-14865" ref_url="https://access.redhat.com/security/cve/CVE-2019-14865" source="CVE"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: grub2-set-bootflag utility causes grubenv corruption rendering the system non-bootable (CVE-2019-14865)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" cwe="CWE-267" href="https://access.redhat.com/security/cve/CVE-2019-14865" impact="moderate" public="20191125">CVE-2019-14865</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764925" id="1764925">CVE-2019-14865 grub2: grub2-set-bootflag utility causes grubenv corruption rendering the system non-bootable</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="grub2-common is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335001"/>
              <criterion comment="grub2-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64 is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335003"/>
              <criterion comment="grub2-efi-aa64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-cdboot is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335005"/>
              <criterion comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-modules is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335007"/>
              <criterion comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32 is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335009"/>
              <criterion comment="grub2-efi-ia32 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-cdboot is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335011"/>
              <criterion comment="grub2-efi-ia32-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-modules is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335013"/>
              <criterion comment="grub2-efi-ia32-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64 is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335015"/>
              <criterion comment="grub2-efi-x64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-cdboot is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335017"/>
              <criterion comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-modules is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335019"/>
              <criterion comment="grub2-efi-x64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335021"/>
              <criterion comment="grub2-pc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc-modules is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335023"/>
              <criterion comment="grub2-pc-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335025"/>
              <criterion comment="grub2-ppc64le is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le-modules is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335027"/>
              <criterion comment="grub2-ppc64le-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335029"/>
              <criterion comment="grub2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-efi is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335031"/>
              <criterion comment="grub2-tools-efi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-extra is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335033"/>
              <criterion comment="grub2-tools-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-minimal is earlier than 1:2.02-78.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200335035"/>
              <criterion comment="grub2-tools-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335036"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200339" version="639">
      <metadata>
        <title>ALSA-2020:0339: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0339" ref_url="https://errata.almalinux.org/8/ALSA-2020-0339.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0339" ref_url="https://access.redhat.com/errata/RHSA-2020:0339" source="RHSA"/>
        <reference ref_id="CVE-2019-14814" ref_url="https://access.redhat.com/security/cve/CVE-2019-14814" source="CVE"/>
        <reference ref_id="CVE-2019-14815" ref_url="https://access.redhat.com/security/cve/CVE-2019-14815" source="CVE"/>
        <reference ref_id="CVE-2019-14816" ref_url="https://access.redhat.com/security/cve/CVE-2019-14816" source="CVE"/>
        <reference ref_id="CVE-2019-14895" ref_url="https://access.redhat.com/security/cve/CVE-2019-14895" source="CVE"/>
        <reference ref_id="CVE-2019-14898" ref_url="https://access.redhat.com/security/cve/CVE-2019-14898" source="CVE"/>
        <reference ref_id="CVE-2019-14901" ref_url="https://access.redhat.com/security/cve/CVE-2019-14901" source="CVE"/>
        <reference ref_id="CVE-2019-17666" ref_url="https://access.redhat.com/security/cve/CVE-2019-17666" source="CVE"/>
        <reference ref_id="CVE-2019-19338" ref_url="https://access.redhat.com/security/cve/CVE-2019-19338" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)

* kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895)

* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)

* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)

* kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS (CVE-2019-14814)

* kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS (CVE-2019-14815)

* kernel: incomplete fix  for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898)

* Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) (CVE-2019-19338)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [Azure][8.1] Include patch "PCI: hv: Avoid use of hv_pci_dev-&gt;pci_slot after freeing it" (BZ#1764635)

* block layer: update to v5.3 (BZ#1777766)

* backport xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (BZ#1778692)

* Backport important bugfixes from upstream post 5.3 (BZ#1778693)

* LUN path recovery issue with Emulex LPe32002 HBA in RHEL 8.0 Server during storage side cable pull testing (BZ#1781108)

* cifs  tasks enter D state and error out with "CIFS VFS: SMB signature verification returned error = -5" (BZ#1781110)

* Update CIFS to linux 5.3 (except RDMA and conflicts) (BZ#1781113)

* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781114)

* blk-mq: overwirte performance drops on real MQ device (BZ#1782181)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14814" impact="moderate" public="20190828:1000">CVE-2019-14814</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14815" impact="moderate" public="20190828:1000">CVE-2019-14815</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14816" impact="important" public="20190828:1000">CVE-2019-14816</cve>
          <cve cvss3="8.0/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-14895" impact="important" public="20191125:0829">CVE-2019-14895</cve>
          <cve cvss3="7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362-&gt;CWE-667" href="https://access.redhat.com/security/cve/CVE-2019-14898" impact="moderate" public="20191120">CVE-2019-14898</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-400|CWE-122)" href="https://access.redhat.com/security/cve/CVE-2019-14901" impact="important" public="20191122">CVE-2019-14901</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-17666" impact="important" public="20191018">CVE-2019-17666</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-385-&gt;CWE-203" href="https://access.redhat.com/security/cve/CVE-2019-19338" impact="moderate" public="20191118">CVE-2019-19338</cve>
          <bugzilla href="https://bugzilla.redhat.com/1744130" id="1744130">CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744137" id="1744137">CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744149" id="1744149">CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763690" id="1763690">CVE-2019-17666 kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1773519" id="1773519">CVE-2019-14901 kernel: heap overflow in marvell/mwifiex/tdls.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774671" id="1774671">CVE-2019-14898 kernel: incomplete fix  for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774870" id="1774870">CVE-2019-14895 kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781514" id="1781514">CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-147.5.1.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20200328025"/>
            <criterion comment="kernel earlier than 0:4.18.0-147.5.1.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20200339052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-147.5.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200339049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200348" version="637">
      <metadata>
        <title>ALSA-2020:0348: container-tools:rhel8 security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0348" ref_url="https://errata.almalinux.org/8/ALSA-2020-0348.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0348" ref_url="https://access.redhat.com/errata/RHSA-2020:0348" source="RHSA"/>
        <reference ref_id="CVE-2019-15890" ref_url="https://access.redhat.com/security/cve/CVE-2019-15890" source="CVE"/>
        <reference ref_id="CVE-2020-7039" ref_url="https://access.redhat.com/security/cve/CVE-2020-7039" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-04"/>
          <updated date="2020-02-04"/>
          <cve cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15890" impact="moderate" public="20190825">CVE-2019-15890</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-7039" impact="important" public="20200107">CVE-2020-7039</cve>
          <bugzilla href="https://bugzilla.redhat.com/1749716" id="1749716">CVE-2019-15890 QEMU: Slirp: use-after-free during packet reassembly</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791551" id="1791551">CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.11.6-4.module+el8.1.1+5259+bcdd613a" test_ref="oval:org.almalinux.alsa:tst:20200348001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.11.6-4.module+el8.1.1+5259+bcdd613a" test_ref="oval:org.almalinux.alsa:tst:20200348003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480051"/>
              <criterion comment="cockpit-podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.6-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480071"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480091"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480111"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480131"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.2-1.module+el8.1.1+5259+bcdd613a" test_ref="oval:org.almalinux.alsa:tst:20200348015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.6.4-2.module+el8.1.1+5363+bf8ff1af" test_ref="oval:org.almalinux.alsa:tst:20200348017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.6.4-2.module+el8.1.1+5363+bf8ff1af" test_ref="oval:org.almalinux.alsa:tst:20200348019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-manpages is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403024"/>
              <criterion comment="podman-manpages is earlier than 0:1.6.4-2.module+el8.1.1+5363+bf8ff1af" test_ref="oval:org.almalinux.alsa:tst:20200348021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.6.4-2.module+el8.1.1+5363+bf8ff1af" test_ref="oval:org.almalinux.alsa:tst:20200348023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.6.4-2.module+el8.1.1+5363+bf8ff1af" test_ref="oval:org.almalinux.alsa:tst:20200348025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202003480271"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202003480272"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc9.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480291"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480311"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480331"/>
              <criterion comment="skopeo-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:0.4.2-2.git21fdece.module+el8.1.1+5460+3ac089c3" test_ref="oval:org.almalinux.alsa:tst:20200348035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.4-1.module_el8.1.0+293+ad8ef41f" test_ref="oval:org.almalinux.alsa:tst:202003480371"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480391"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200465" version="635">
      <metadata>
        <title>ALSA-2020:0465: java-1.8.0-ibm security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0465" ref_url="https://errata.almalinux.org/8/ALSA-2020-0465.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0465" ref_url="https://access.redhat.com/errata/RHSA-2020:0465" source="RHSA"/>
        <reference ref_id="CVE-2020-2583" ref_url="https://access.redhat.com/security/cve/CVE-2020-2583" source="CVE"/>
        <reference ref_id="CVE-2020-2593" ref_url="https://access.redhat.com/security/cve/CVE-2020-2593" source="CVE"/>
        <reference ref_id="CVE-2020-2604" ref_url="https://access.redhat.com/security/cve/CVE-2020-2604" source="CVE"/>
        <reference ref_id="CVE-2020-2659" ref_url="https://access.redhat.com/security/cve/CVE-2020-2659" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP5.

Security Fix(es):

* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604)

* OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593)

* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-12"/>
          <updated date="2020-02-12"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2583" impact="low" public="20200114">CVE-2020-2583</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2020-2593" impact="moderate" public="20200114">CVE-2020-2593</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-2604" impact="important" public="20200114">CVE-2020-2604</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2659" impact="low" public="20200114">CVE-2020-2659</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790444" id="1790444">CVE-2020-2583 OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790884" id="1790884">CVE-2020-2593 OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790944" id="1790944">CVE-2020-2604 OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791284" id="1791284">CVE-2020-2659 OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.5-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200465015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200487" version="637">
      <metadata>
        <title>ALSA-2020:0487: sudo security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0487" ref_url="https://errata.almalinux.org/8/ALSA-2020-0487.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0487" ref_url="https://access.redhat.com/errata/RHSA-2020:0487" source="RHSA"/>
        <reference ref_id="CVE-2019-18634" ref_url="https://access.redhat.com/security/cve/CVE-2019-18634" source="CVE"/>
        <description>The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

Security Fix(es):

* sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-14"/>
          <updated date="2020-02-14"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-18634" impact="important" public="20200130">CVE-2019-18634</cve>
          <bugzilla href="https://bugzilla.redhat.com/1796944" id="1796944">CVE-2019-18634 sudo: Stack based buffer overflow when pwfeedback is enabled</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="sudo is earlier than 0:1.8.25p1-8.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20200487001"/>
          <criterion comment="sudo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193694002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200512" version="637">
      <metadata>
        <title>ALSA-2020:0512: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0512" ref_url="https://errata.almalinux.org/8/ALSA-2020-0512.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0512" ref_url="https://access.redhat.com/errata/RHSA-2020:0512" source="RHSA"/>
        <reference ref_id="CVE-2020-6796" ref_url="https://access.redhat.com/security/cve/CVE-2020-6796" source="CVE"/>
        <reference ref_id="CVE-2020-6798" ref_url="https://access.redhat.com/security/cve/CVE-2020-6798" source="CVE"/>
        <reference ref_id="CVE-2020-6800" ref_url="https://access.redhat.com/security/cve/CVE-2020-6800" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.5.0 ESR.

Security Fix(es):

* Mozilla: Missing bounds check on shared memory read in the parent process (CVE-2020-6796)

* Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800)

* Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-17"/>
          <updated date="2020-02-17"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-6796" impact="important" public="20200211">CVE-2020-6796</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-6798" impact="moderate" public="20200211">CVE-2020-6798</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6800" impact="important" public="20200211">CVE-2020-6800</cve>
          <bugzilla href="https://bugzilla.redhat.com/1801916" id="1801916">CVE-2020-6796 Mozilla: Missing bounds check on shared memory read in the parent process</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801918" id="1801918">CVE-2020-6798 Mozilla: Incorrect parsing of template tag could result in JavaScript injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801920" id="1801920">CVE-2020-6800 Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.5.0-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200512001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200559" version="639">
      <metadata>
        <title>ALSA-2020:0559: ksh security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0559" ref_url="https://errata.almalinux.org/8/ALSA-2020-0559.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0559" ref_url="https://access.redhat.com/errata/RHSA-2020:0559" source="RHSA"/>
        <reference ref_id="CVE-2019-14868" ref_url="https://access.redhat.com/security/cve/CVE-2019-14868" source="CVE"/>
        <description>KornShell (ksh) is a Unix shell developed by AT&amp;T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992).

Security Fix(es):

* ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (CVE-2019-14868)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-20"/>
          <updated date="2020-02-20"/>
          <cve cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://access.redhat.com/security/cve/CVE-2019-14868" impact="important" public="20191213">CVE-2019-14868</cve>
          <bugzilla href="https://bugzilla.redhat.com/1757324" id="1757324">CVE-2019-14868 ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="ksh is earlier than 0:20120801-253.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200559001"/>
          <criterion comment="ksh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200559002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200570" version="635">
      <metadata>
        <title>ALSA-2020:0570: openjpeg2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0570" ref_url="https://errata.almalinux.org/8/ALSA-2020-0570.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0570" ref_url="https://access.redhat.com/errata/RHSA-2020:0570" source="RHSA"/>
        <reference ref_id="CVE-2020-8112" ref_url="https://access.redhat.com/security/cve/CVE-2020-8112" source="CVE"/>
        <description>OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.

Security Fix(es):

* openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c (CVE-2020-8112)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-24"/>
          <updated date="2020-02-24"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-8112" impact="important" public="20200207:1135">CVE-2020-8112</cve>
          <bugzilla href="https://bugzilla.redhat.com/1800535" id="1800535">CVE-2020-8112 openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openjpeg2 is earlier than 0:2.3.1-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200570001"/>
              <criterion comment="openjpeg2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel is earlier than 0:2.3.1-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200570003"/>
              <criterion comment="openjpeg2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-devel-docs is earlier than 0:2.3.1-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200570005"/>
              <criterion comment="openjpeg2-devel-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openjpeg2-tools is earlier than 0:2.3.1-3.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200570007"/>
              <criterion comment="openjpeg2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20193408008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200575" version="635">
      <metadata>
        <title>ALSA-2020:0575: systemd security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0575" ref_url="https://errata.almalinux.org/8/ALSA-2020-0575.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0575" ref_url="https://access.redhat.com/errata/RHSA-2020:0575" source="RHSA"/>
        <reference ref_id="CVE-2020-1712" ref_url="https://access.redhat.com/security/cve/CVE-2020-1712" source="CVE"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: use-after-free when asynchronous polkit queries are performed (CVE-2020-1712)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* systemd: systemctl reload command breaks ordering dependencies between units (BZ#1781712)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-24"/>
          <updated date="2020-02-24"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-1712" impact="important" public="20200205:0900">CVE-2020-1712</cve>
          <bugzilla href="https://bugzilla.redhat.com/1794578" id="1794578">CVE-2020-1712 systemd: use-after-free when asynchronous polkit queries are performed</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="systemd is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575001"/>
              <criterion comment="systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-container is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575003"/>
              <criterion comment="systemd-container is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-devel is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575005"/>
              <criterion comment="systemd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-journal-remote is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575007"/>
              <criterion comment="systemd-journal-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-libs is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575009"/>
              <criterion comment="systemd-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-pam is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575011"/>
              <criterion comment="systemd-pam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-tests is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575013"/>
              <criterion comment="systemd-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-udev is earlier than 0:239-18.el8_1.4" test_ref="oval:org.almalinux.alsa:tst:20200575015"/>
              <criterion comment="systemd-udev is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200577" version="636">
      <metadata>
        <title>ALSA-2020:0577: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0577" ref_url="https://errata.almalinux.org/8/ALSA-2020-0577.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0577" ref_url="https://access.redhat.com/errata/RHSA-2020:0577" source="RHSA"/>
        <reference ref_id="CVE-2020-6792" ref_url="https://access.redhat.com/security/cve/CVE-2020-6792" source="CVE"/>
        <reference ref_id="CVE-2020-6793" ref_url="https://access.redhat.com/security/cve/CVE-2020-6793" source="CVE"/>
        <reference ref_id="CVE-2020-6794" ref_url="https://access.redhat.com/security/cve/CVE-2020-6794" source="CVE"/>
        <reference ref_id="CVE-2020-6795" ref_url="https://access.redhat.com/security/cve/CVE-2020-6795" source="CVE"/>
        <reference ref_id="CVE-2020-6798" ref_url="https://access.redhat.com/security/cve/CVE-2020-6798" source="CVE"/>
        <reference ref_id="CVE-2020-6800" ref_url="https://access.redhat.com/security/cve/CVE-2020-6800" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.5.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800)

* Mozilla: Out-of-bounds read when processing certain email messages (CVE-2020-6793)

* Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords (CVE-2020-6794)

* Mozilla: Crash processing S/MIME messages with multiple signatures (CVE-2020-6795)

* Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798)

* Mozilla: Message ID calculation was based on uninitialized data (CVE-2020-6792)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-24"/>
          <updated date="2020-02-24"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-456" href="https://access.redhat.com/security/cve/CVE-2020-6792" impact="low" public="20200211">CVE-2020-6792</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-6793" impact="moderate" public="20200211">CVE-2020-6793</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-312" href="https://access.redhat.com/security/cve/CVE-2020-6794" impact="moderate" public="20200211">CVE-2020-6794</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-6795" impact="moderate" public="20200211">CVE-2020-6795</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-6798" impact="moderate" public="20200211">CVE-2020-6798</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6800" impact="important" public="20200211">CVE-2020-6800</cve>
          <bugzilla href="https://bugzilla.redhat.com/1801918" id="1801918">CVE-2020-6798 Mozilla: Incorrect parsing of template tag could result in JavaScript injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801920" id="1801920">CVE-2020-6800 Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801955" id="1801955">CVE-2020-6793 Mozilla: Out-of-bounds read when processing certain email messages</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801956" id="1801956">CVE-2020-6794 Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801957" id="1801957">CVE-2020-6795 Mozilla: Crash processing S/MIME messages with multiple signatures</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801958" id="1801958">CVE-2020-6792 Mozilla: Message ID calculation was based on uninitialized data</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.5.0-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200577001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200579" version="637">
      <metadata>
        <title>ALSA-2020:0579: nodejs:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0579" ref_url="https://errata.almalinux.org/8/ALSA-2020-0579.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0579" ref_url="https://access.redhat.com/errata/RHSA-2020:0579" source="RHSA"/>
        <reference ref_id="CVE-2019-15604" ref_url="https://access.redhat.com/security/cve/CVE-2019-15604" source="CVE"/>
        <reference ref_id="CVE-2019-15605" ref_url="https://access.redhat.com/security/cve/CVE-2019-15605" source="CVE"/>
        <reference ref_id="CVE-2019-15606" ref_url="https://access.redhat.com/security/cve/CVE-2019-15606" source="CVE"/>
        <reference ref_id="CVE-2019-16775" ref_url="https://access.redhat.com/security/cve/CVE-2019-16775" source="CVE"/>
        <reference ref_id="CVE-2019-16776" ref_url="https://access.redhat.com/security/cve/CVE-2019-16776" source="CVE"/>
        <reference ref_id="CVE-2019-16777" ref_url="https://access.redhat.com/security/cve/CVE-2019-16777" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (10.19.0).

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)

* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)

* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)

* npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775)

* npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776)

* npm: Global node_modules Binary Overwrite (CVE-2019-16777)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-25"/>
          <updated date="2020-02-25"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2019-15604" impact="moderate" public="20200207">CVE-2019-15604</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-15605" impact="important" public="20200207">CVE-2019-15605</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2019-15606" impact="moderate" public="20200207">CVE-2019-15606</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16775" impact="low" public="20191212">CVE-2019-16775</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16776" impact="low" public="20191212">CVE-2019-16776</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16777" impact="low" public="20191212">CVE-2019-16777</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788301" id="1788301">CVE-2019-16777 npm: Global node_modules Binary Overwrite</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788305" id="1788305">CVE-2019-16775 npm: Symlink reference outside of node_modules folder through the bin field upon installation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788310" id="1788310">CVE-2019-16776 npm: Arbitrary file write via constructed entry in the package.json bin field</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800364" id="1800364">CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800366" id="1800366">CVE-2019-15606 nodejs: HTTP header values do not have trailing optional whitespace trimmed</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800367" id="1800367">CVE-2019-15604 nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:10.19.0-1.module+el8.1.0+5726+6ed65f8c" test_ref="oval:org.almalinux.alsa:tst:20200579001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:10.19.0-1.module+el8.1.0+5726+6ed65f8c" test_ref="oval:org.almalinux.alsa:tst:20200579003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:10.19.0-1.module+el8.1.0+5726+6ed65f8c" test_ref="oval:org.almalinux.alsa:tst:20200579005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.13.4-1.10.19.0.1.module+el8.1.0+5726+6ed65f8c" test_ref="oval:org.almalinux.alsa:tst:20200579011"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200580" version="635">
      <metadata>
        <title>ALSA-2020:0580: python-pillow security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0580" ref_url="https://errata.almalinux.org/8/ALSA-2020-0580.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0580" ref_url="https://access.redhat.com/errata/RHSA-2020:0580" source="RHSA"/>
        <reference ref_id="CVE-2019-16865" ref_url="https://access.redhat.com/security/cve/CVE-2019-16865" source="CVE"/>
        <reference ref_id="CVE-2020-5311" ref_url="https://access.redhat.com/security/cve/CVE-2020-5311" source="CVE"/>
        <reference ref_id="CVE-2020-5312" ref_url="https://access.redhat.com/security/cve/CVE-2020-5312" source="CVE"/>
        <description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.

Security Fix(es):

* python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c (CVE-2020-5311)

* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)

* python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-24"/>
          <updated date="2020-02-24"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-16865" impact="moderate" public="20191004">CVE-2019-16865</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-5311" impact="important" public="20200103">CVE-2020-5311</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-5312" impact="important" public="20200103">CVE-2020-5312</cve>
          <bugzilla href="https://bugzilla.redhat.com/1774066" id="1774066">CVE-2019-16865 python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789533" id="1789533">CVE-2020-5312 python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789535" id="1789535">CVE-2020-5311 python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="python3-pillow is earlier than 0:5.1.1-10.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200580001"/>
          <criterion comment="python3-pillow is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200580002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200598" version="635">
      <metadata>
        <title>ALSA-2020:0598: nodejs:12 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0598" ref_url="https://errata.almalinux.org/8/ALSA-2020-0598.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0598" ref_url="https://access.redhat.com/errata/RHSA-2020:0598" source="RHSA"/>
        <reference ref_id="CVE-2019-15604" ref_url="https://access.redhat.com/security/cve/CVE-2019-15604" source="CVE"/>
        <reference ref_id="CVE-2019-15605" ref_url="https://access.redhat.com/security/cve/CVE-2019-15605" source="CVE"/>
        <reference ref_id="CVE-2019-15606" ref_url="https://access.redhat.com/security/cve/CVE-2019-15606" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (12.16.1).

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)

* nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604)

* nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-25"/>
          <updated date="2020-02-25"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2019-15604" impact="moderate" public="20200207">CVE-2019-15604</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-15605" impact="important" public="20200207">CVE-2019-15605</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2019-15606" impact="moderate" public="20200207">CVE-2019-15606</cve>
          <bugzilla href="https://bugzilla.redhat.com/1800364" id="1800364">CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800366" id="1800366">CVE-2019-15606 nodejs: HTTP header values do not have trailing optional whitespace trimmed</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800367" id="1800367">CVE-2019-15604 nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:12.16.1-1.module+el8.1.0+5811+44509afe" test_ref="oval:org.almalinux.alsa:tst:20200598001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:12.16.1-1.module+el8.1.0+5811+44509afe" test_ref="oval:org.almalinux.alsa:tst:20200598003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:12.16.1-1.module+el8.1.0+5811+44509afe" test_ref="oval:org.almalinux.alsa:tst:20200598005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.13.4-1.12.16.1.1.module+el8.1.0+5811+44509afe" test_ref="oval:org.almalinux.alsa:tst:20200598011"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200633" version="635">
      <metadata>
        <title>ALSA-2020:0633: ppp security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0633" ref_url="https://errata.almalinux.org/8/ALSA-2020-0633.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0633" ref_url="https://access.redhat.com/errata/RHSA-2020:0633" source="RHSA"/>
        <reference ref_id="CVE-2020-8597" ref_url="https://access.redhat.com/security/cve/CVE-2020-8597" source="CVE"/>
        <description>The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.

Security Fix(es):

* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-02-27"/>
          <updated date="2020-02-27"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-8597" impact="important" public="20200203">CVE-2020-8597</cve>
          <bugzilla href="https://bugzilla.redhat.com/1800727" id="1800727">CVE-2020-8597 ppp: Buffer overflow in the eap_request and eap_response functions in eap.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="network-scripts-ppp is earlier than 0:2.4.7-26.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200633001"/>
              <criterion comment="network-scripts-ppp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200633002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ppp is earlier than 0:2.4.7-26.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200633003"/>
              <criterion comment="ppp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200633004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ppp-devel is earlier than 0:2.4.7-26.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200633005"/>
              <criterion comment="ppp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200633006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200708" version="635">
      <metadata>
        <title>ALSA-2020:0708: http-parser security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0708" ref_url="https://errata.almalinux.org/8/ALSA-2020-0708.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0708" ref_url="https://access.redhat.com/errata/RHSA-2020:0708" source="RHSA"/>
        <reference ref_id="CVE-2019-15605" ref_url="https://access.redhat.com/security/cve/CVE-2019-15605" source="CVE"/>
        <description>The http-parser package provides a utility for parsing HTTP messages. It parses both requests and responses. The parser is designed to be used in performance HTTP applications. It does not make any system calls or allocations, it does not buffer data, and it can be interrupted at any time. Depending on your architecture, it only requires about 40 bytes of data per message stream.

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-04"/>
          <updated date="2020-03-04"/>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-15605" impact="important" public="20200207">CVE-2019-15605</cve>
          <bugzilla href="https://bugzilla.redhat.com/1800364" id="1800364">CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="http-parser is earlier than 0:2.8.0-5.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200708001"/>
          <criterion comment="http-parser is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193497002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200820" version="636">
      <metadata>
        <title>ALSA-2020:0820: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0820" ref_url="https://errata.almalinux.org/8/ALSA-2020-0820.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0820" ref_url="https://access.redhat.com/errata/RHSA-2020:0820" source="RHSA"/>
        <reference ref_id="CVE-2019-20503" ref_url="https://access.redhat.com/security/cve/CVE-2019-20503" source="CVE"/>
        <reference ref_id="CVE-2020-6805" ref_url="https://access.redhat.com/security/cve/CVE-2020-6805" source="CVE"/>
        <reference ref_id="CVE-2020-6806" ref_url="https://access.redhat.com/security/cve/CVE-2020-6806" source="CVE"/>
        <reference ref_id="CVE-2020-6807" ref_url="https://access.redhat.com/security/cve/CVE-2020-6807" source="CVE"/>
        <reference ref_id="CVE-2020-6811" ref_url="https://access.redhat.com/security/cve/CVE-2020-6811" source="CVE"/>
        <reference ref_id="CVE-2020-6812" ref_url="https://access.redhat.com/security/cve/CVE-2020-6812" source="CVE"/>
        <reference ref_id="CVE-2020-6814" ref_url="https://access.redhat.com/security/cve/CVE-2020-6814" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.6.0 ESR.

Security Fix(es):

* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805)

* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806)

* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807)

* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814)

* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503)

* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811)

* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-16"/>
          <updated date="2020-03-16"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20503" impact="moderate" public="20200310">CVE-2019-20503</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6805" impact="important" public="20200310">CVE-2020-6805</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-6806" impact="important" public="20200310">CVE-2020-6806</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6807" impact="important" public="20200310">CVE-2020-6807</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-78" href="https://access.redhat.com/security/cve/CVE-2020-6811" impact="moderate" public="20200310">CVE-2020-6811</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-6812" impact="moderate" public="20200310">CVE-2020-6812</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6814" impact="important" public="20200310">CVE-2020-6814</cve>
          <bugzilla href="https://bugzilla.redhat.com/1812199" id="1812199">CVE-2020-6805 Mozilla: Use-after-free when removing data about origins</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812200" id="1812200">CVE-2020-6806 Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812201" id="1812201">CVE-2020-6807 Mozilla: Use-after-free in cubeb during stream destruction</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812202" id="1812202">CVE-2020-6811 Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812203" id="1812203">CVE-2019-20503 usrsctp: Out of bounds reads in sctp_load_addresses_from_init()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812204" id="1812204">CVE-2020-6812 Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812205" id="1812205">CVE-2020-6814 Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.6.0-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200820001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200902" version="636">
      <metadata>
        <title>ALSA-2020:0902: icu security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0902" ref_url="https://errata.almalinux.org/8/ALSA-2020-0902.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0902" ref_url="https://access.redhat.com/errata/RHSA-2020:0902" source="RHSA"/>
        <reference ref_id="CVE-2020-10531" ref_url="https://access.redhat.com/security/cve/CVE-2020-10531" source="CVE"/>
        <description>The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.

Security Fix(es):

* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-19"/>
          <updated date="2020-03-19"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-10531" impact="important" public="20200225">CVE-2020-10531</cve>
          <bugzilla href="https://bugzilla.redhat.com/1807349" id="1807349">CVE-2020-10531 ICU: Integer overflow in UnicodeString::doAppend()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="icu is earlier than 0:60.3-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200902001"/>
              <criterion comment="icu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200902002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libicu is earlier than 0:60.3-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200902003"/>
              <criterion comment="libicu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200902004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libicu-devel is earlier than 0:60.3-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200902005"/>
              <criterion comment="libicu-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200902006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libicu-doc is earlier than 0:60.3-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200902007"/>
              <criterion comment="libicu-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200902008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200903" version="635">
      <metadata>
        <title>ALSA-2020:0903: zsh security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0903" ref_url="https://errata.almalinux.org/8/ALSA-2020-0903.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0903" ref_url="https://access.redhat.com/errata/RHSA-2020:0903" source="RHSA"/>
        <reference ref_id="CVE-2019-20044" ref_url="https://access.redhat.com/security/cve/CVE-2019-20044" source="CVE"/>
        <description>The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more.

Security Fix(es):

* zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-19"/>
          <updated date="2020-03-19"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-271" href="https://access.redhat.com/security/cve/CVE-2019-20044" impact="important" public="20200216">CVE-2019-20044</cve>
          <bugzilla href="https://bugzilla.redhat.com/1804859" id="1804859">CVE-2019-20044 zsh: insecure dropping of privileges when unsetting PRIVILEGED option</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="zsh is earlier than 0:5.5.1-6.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200903001"/>
              <criterion comment="zsh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200903002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="zsh-html is earlier than 0:5.5.1-6.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200903003"/>
              <criterion comment="zsh-html is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200903004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200919" version="636">
      <metadata>
        <title>ALSA-2020:0919: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0919" ref_url="https://errata.almalinux.org/8/ALSA-2020-0919.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0919" ref_url="https://access.redhat.com/errata/RHSA-2020:0919" source="RHSA"/>
        <reference ref_id="CVE-2019-20503" ref_url="https://access.redhat.com/security/cve/CVE-2019-20503" source="CVE"/>
        <reference ref_id="CVE-2020-6805" ref_url="https://access.redhat.com/security/cve/CVE-2020-6805" source="CVE"/>
        <reference ref_id="CVE-2020-6806" ref_url="https://access.redhat.com/security/cve/CVE-2020-6806" source="CVE"/>
        <reference ref_id="CVE-2020-6807" ref_url="https://access.redhat.com/security/cve/CVE-2020-6807" source="CVE"/>
        <reference ref_id="CVE-2020-6811" ref_url="https://access.redhat.com/security/cve/CVE-2020-6811" source="CVE"/>
        <reference ref_id="CVE-2020-6812" ref_url="https://access.redhat.com/security/cve/CVE-2020-6812" source="CVE"/>
        <reference ref_id="CVE-2020-6814" ref_url="https://access.redhat.com/security/cve/CVE-2020-6814" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.6.0.

Security Fix(es):

* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805)

* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806)

* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807)

* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814)

* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503)

* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811)

* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-23"/>
          <updated date="2020-03-23"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20503" impact="moderate" public="20200310">CVE-2019-20503</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6805" impact="important" public="20200310">CVE-2020-6805</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-6806" impact="important" public="20200310">CVE-2020-6806</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6807" impact="important" public="20200310">CVE-2020-6807</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-78" href="https://access.redhat.com/security/cve/CVE-2020-6811" impact="moderate" public="20200310">CVE-2020-6811</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-6812" impact="moderate" public="20200310">CVE-2020-6812</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6814" impact="important" public="20200310">CVE-2020-6814</cve>
          <bugzilla href="https://bugzilla.redhat.com/1812199" id="1812199">CVE-2020-6805 Mozilla: Use-after-free when removing data about origins</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812200" id="1812200">CVE-2020-6806 Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812201" id="1812201">CVE-2020-6807 Mozilla: Use-after-free in cubeb during stream destruction</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812202" id="1812202">CVE-2020-6811 Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812203" id="1812203">CVE-2019-20503 usrsctp: Out of bounds reads in sctp_load_addresses_from_init()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812204" id="1812204">CVE-2020-6812 Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1812205" id="1812205">CVE-2020-6814 Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.6.0-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200919001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200920" version="635">
      <metadata>
        <title>ALSA-2020:0920: libvncserver security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0920" ref_url="https://errata.almalinux.org/8/ALSA-2020-0920.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0920" ref_url="https://access.redhat.com/errata/RHSA-2020:0920" source="RHSA"/>
        <reference ref_id="CVE-2019-15690" ref_url="https://access.redhat.com/security/cve/CVE-2019-15690" source="CVE"/>
        <reference ref_id="CVE-2019-20788" ref_url="https://access.redhat.com/security/cve/CVE-2019-20788" source="CVE"/>
        <description>LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.

Security Fix(es):

* libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow (CVE-2019-15690)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-23"/>
          <updated date="2020-03-23"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-15690" impact="important" public="20191220">CVE-2019-15690</cve>
          <cve cvss3="0.0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cwe="(CWE-122|CWE-190)" href="https://access.redhat.com/security/cve/CVE-2019-20788" public="20191117">CVE-2019-20788</cve>
          <bugzilla href="https://bugzilla.redhat.com/1811948" id="1811948">CVE-2019-15690 libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1829870" id="1829870">CVE-2019-20788 libvncserver: integer overflow and heap-based buffer overflow in libvncclient/cursor.c in HandleCursorShape function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libvncserver is earlier than 0:0.9.11-9.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200920001"/>
              <criterion comment="libvncserver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvncserver-devel is earlier than 0:0.9.11-9.el8_1.2" test_ref="oval:org.almalinux.alsa:tst:20200920003"/>
              <criterion comment="libvncserver-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20200981" version="635">
      <metadata>
        <title>ALSA-2020:0981: ipmitool security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:0981" ref_url="https://errata.almalinux.org/8/ALSA-2020-0981.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:0981" ref_url="https://access.redhat.com/errata/RHSA-2020:0981" source="RHSA"/>
        <reference ref_id="CVE-2020-5208" ref_url="https://access.redhat.com/security/cve/CVE-2020-5208" source="CVE"/>
        <description>The ipmitool packages contain a command-line utility for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification. IPMI is an open standard for machine health, inventory, and remote power control.

Security Fix(es):

* ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-03-26"/>
          <updated date="2020-03-26"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-5208" impact="important" public="20200205">CVE-2020-5208</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798721" id="1798721">CVE-2020-5208 ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="exchange-bmc-os-info is earlier than 0:1.8.18-12.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200981001"/>
              <criterion comment="exchange-bmc-os-info is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200981002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipmievd is earlier than 0:1.8.18-12.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200981003"/>
              <criterion comment="ipmievd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200981004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ipmitool is earlier than 0:1.8.18-12.el8_1" test_ref="oval:org.almalinux.alsa:tst:20200981005"/>
              <criterion comment="ipmitool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200981006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201288" version="641">
      <metadata>
        <title>ALSA-2020:1288: haproxy security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1288" ref_url="https://errata.almalinux.org/8/ALSA-2020-1288.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1288" ref_url="https://access.redhat.com/errata/RHSA-2020:1288" source="RHSA"/>
        <reference ref_id="CVE-2020-11100" ref_url="https://access.redhat.com/security/cve/CVE-2020-11100" source="CVE"/>
        <description>The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.

Security Fix(es):

* haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes (CVE-2020-11100)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-02"/>
          <updated date="2020-04-02"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-11100" impact="critical" public="20200402:1300">CVE-2020-11100</cve>
          <bugzilla href="https://bugzilla.redhat.com/1819111" id="1819111">CVE-2020-11100 haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="haproxy is earlier than 0:1.8.15-6.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20201288001"/>
          <criterion comment="haproxy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201288002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201293" version="635">
      <metadata>
        <title>ALSA-2020:1293: nodejs:12 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1293" ref_url="https://errata.almalinux.org/8/ALSA-2020-1293.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1293" ref_url="https://access.redhat.com/errata/RHSA-2020:1293" source="RHSA"/>
        <reference ref_id="CVE-2020-10531" ref_url="https://access.redhat.com/security/cve/CVE-2020-10531" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-02"/>
          <updated date="2020-04-02"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-10531" impact="important" public="20200225">CVE-2020-10531</cve>
          <bugzilla href="https://bugzilla.redhat.com/1807349" id="1807349">CVE-2020-10531 ICU: Integer overflow in UnicodeString::doAppend()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:12.16.1-2.module_el8.1.0+295+e9ddcc19" test_ref="oval:org.almalinux.alsa:tst:202012930011"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:12.16.1-2.module_el8.1.0+295+e9ddcc19" test_ref="oval:org.almalinux.alsa:tst:202012930031"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:12.16.1-2.module_el8.1.0+295+e9ddcc19" test_ref="oval:org.almalinux.alsa:tst:202012930051"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.13.4-1.12.16.1.2.module_el8.1.0+295+e9ddcc19" test_ref="oval:org.almalinux.alsa:tst:202012930111"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201317" version="635">
      <metadata>
        <title>ALSA-2020:1317: nodejs:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1317" ref_url="https://errata.almalinux.org/8/ALSA-2020-1317.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1317" ref_url="https://access.redhat.com/errata/RHSA-2020:1317" source="RHSA"/>
        <reference ref_id="CVE-2020-10531" ref_url="https://access.redhat.com/security/cve/CVE-2020-10531" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-06"/>
          <updated date="2020-04-06"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-10531" impact="important" public="20200225">CVE-2020-10531</cve>
          <bugzilla href="https://bugzilla.redhat.com/1807349" id="1807349">CVE-2020-10531 ICU: Integer overflow in UnicodeString::doAppend()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.19.0-2.module_el8.1.0+296+bef51246" test_ref="oval:org.almalinux.alsa:tst:202013170011"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.19.0-2.module_el8.1.0+296+bef51246" test_ref="oval:org.almalinux.alsa:tst:202013170031"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.19.0-2.module_el8.1.0+296+bef51246" test_ref="oval:org.almalinux.alsa:tst:202013170051"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.13.4-1.10.19.0.2.module_el8.1.0+296+bef51246" test_ref="oval:org.almalinux.alsa:tst:202013170111"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201318" version="635">
      <metadata>
        <title>ALSA-2020:1318: telnet security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1318" ref_url="https://errata.almalinux.org/8/ALSA-2020-1318.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1318" ref_url="https://access.redhat.com/errata/RHSA-2020:1318" source="RHSA"/>
        <reference ref_id="CVE-2020-10188" ref_url="https://access.redhat.com/security/cve/CVE-2020-10188" source="CVE"/>
        <description>Telnet is a popular protocol for logging in to remote systems over the Internet. The telnet-server packages include a telnet service that supports remote logins into the host machine. The telnet service is disabled by default.

Security Fix(es):

* telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code (CVE-2020-10188)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-06"/>
          <updated date="2020-04-06"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-10188" impact="important" public="20200228">CVE-2020-10188</cve>
          <bugzilla href="https://bugzilla.redhat.com/1811673" id="1811673">CVE-2020-10188 telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="telnet-server is earlier than 1:0.17-73.el8_1.1" test_ref="oval:org.almalinux.alsa:tst:20201318001"/>
          <criterion comment="telnet-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201318002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201341" version="635">
      <metadata>
        <title>ALSA-2020:1341: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1341" ref_url="https://errata.almalinux.org/8/ALSA-2020-1341.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1341" ref_url="https://access.redhat.com/errata/RHSA-2020:1341" source="RHSA"/>
        <reference ref_id="CVE-2020-6819" ref_url="https://access.redhat.com/security/cve/CVE-2020-6819" source="CVE"/>
        <reference ref_id="CVE-2020-6820" ref_url="https://access.redhat.com/security/cve/CVE-2020-6820" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.6.1 ESR.

Security Fix(es):

* Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819)

* Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6819" impact="critical" public="20200403">CVE-2020-6819</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6820" impact="critical" public="20200403">CVE-2020-6820</cve>
          <bugzilla href="https://bugzilla.redhat.com/1820869" id="1820869">CVE-2020-6819 Mozilla: Use-after-free while running the nsDocShell destructor</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820878" id="1820878">CVE-2020-6820 Mozilla: Use-after-free when handling a ReadableStream</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.6.1-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201341001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201358" version="637">
      <metadata>
        <title>ALSA-2020:1358: virt:rhel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1358" ref_url="https://errata.almalinux.org/8/ALSA-2020-1358.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1358" ref_url="https://access.redhat.com/errata/RHSA-2020:1358" source="RHSA"/>
        <reference ref_id="CVE-2020-1711" ref_url="https://access.redhat.com/security/cve/CVE-2020-1711" source="CVE"/>
        <reference ref_id="CVE-2020-7039" ref_url="https://access.redhat.com/security/cve/CVE-2020-7039" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711)

* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-1711" impact="important" public="20200123">CVE-2020-1711</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-7039" impact="important" public="20200107">CVE-2020-7039</cve>
          <bugzilla href="https://bugzilla.redhat.com/1791551" id="1791551">CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1794290" id="1794290">CVE-2020-1711 QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20171214-6.gitfa98132.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450011"/>
                  <criterion comment="SLOF is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450031"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450051"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450071"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450091"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450111"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450131"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450151"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450171"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450231"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450251"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450271"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450331"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450351"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450371"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450391"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450411"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933450431"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580511"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580531"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580551"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580571"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580591"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580611"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580631"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580651"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580671"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580691"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580711"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580731"/>
                  <criterion comment="libvirt-daemon-driver-qemu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580751"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580771"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580791"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580811"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580831"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580851"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580871"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580891"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580911"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580931"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580951"/>
                  <criterion comment="libvirt-daemon-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750982"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450971"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013580991"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013581011"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013581031"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013581051"/>
                  <criterion comment="libvirt-lock-sanlock is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013581071"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451091"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451111"/>
                  <criterion comment="nbdkit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451131"/>
                  <criterion comment="nbdkit-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751162"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451151"/>
                  <criterion comment="nbdkit-basic-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451171"/>
                  <criterion comment="nbdkit-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451191"/>
                  <criterion comment="nbdkit-example-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451211"/>
                  <criterion comment="nbdkit-plugin-gzip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451231"/>
                  <criterion comment="nbdkit-plugin-python-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451251"/>
                  <criterion comment="nbdkit-plugin-python3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451271"/>
                  <criterion comment="nbdkit-plugin-vddk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751302"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451291"/>
                  <criterion comment="nbdkit-plugin-xz is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751322"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451371"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451391"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451411"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451431"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451451"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451471"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581491"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581511"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581531"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581551"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581571"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581591"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581611"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581631"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581651"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013581671"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451691"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451711"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451731"/>
                  <criterion comment="seabios is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451751"/>
                  <criterion comment="seabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751782"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451771"/>
                  <criterion comment="seavgabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751802"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451831"/>
                  <criterion comment="supermin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451851"/>
                  <criterion comment="supermin-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451871"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-p2v-maker is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451891"/>
                  <criterion comment="virt-p2v-maker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933451911"/>
                  <criterion comment="virt-v2v is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751942"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451941"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451951"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451961"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582001"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582011"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582021"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582031"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582041"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582051"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582061"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582071"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582081"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582091"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582101"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582111"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582121"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582131"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582141"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582151"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582161"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582171"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582181"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582191"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452201"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582211"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582221"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582231"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-35.3.module_el8.1.0+297+df420408" test_ref="oval:org.almalinux.alsa:tst:202013582241"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452281"/>
                  <criterion comment="ocaml-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452292"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452301"/>
                  <criterion comment="ocaml-hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452312"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452321"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.38.4-14.module_el8.1.0+248+298dec18" test_ref="oval:org.almalinux.alsa:tst:201933452341"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452361"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452371"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452381"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452391"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:2.12.0-88.module_el8.1.0+297+df420408.3" test_ref="oval:org.almalinux.alsa:tst:202013582401"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452421"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201360" version="636">
      <metadata>
        <title>ALSA-2020:1360: container-tools:1.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1360" ref_url="https://errata.almalinux.org/8/ALSA-2020-1360.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1360" ref_url="https://access.redhat.com/errata/RHSA-2020:1360" source="RHSA"/>
        <reference ref_id="CVE-2020-7039" ref_url="https://access.redhat.com/security/cve/CVE-2020-7039" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-7039" impact="important" public="20200107">CVE-2020-7039</cve>
          <bugzilla href="https://bugzilla.redhat.com/1791551" id="1791551">CVE-2020-7039 QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:1.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193494025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-6.gite94b4f9.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:201942730011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.94-1.git1e99f1d.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:201934940031"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730051"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730052"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730053"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730071"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730072"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730073"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940091"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940092"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940093"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940111"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940112"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940113"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940131"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201934940132"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201934940133"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:201942730151"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:201942730171"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730191"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730192"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730193"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730211"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:201942730212"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:201942730213"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-4.dev.gitc4e1bc5.module_el8.1.0+299+10c6b3e0" test_ref="oval:org.almalinux.alsa:tst:202013600231"/>
              <criterion comment="slirp4netns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750242"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201372" version="642">
      <metadata>
        <title>ALSA-2020:1372: kernel security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1372" ref_url="https://errata.almalinux.org/8/ALSA-2020-1372.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1372" ref_url="https://access.redhat.com/errata/RHSA-2020:1372" source="RHSA"/>
        <reference ref_id="CVE-2019-15030" ref_url="https://access.redhat.com/security/cve/CVE-2019-15030" source="CVE"/>
        <reference ref_id="CVE-2019-15031" ref_url="https://access.redhat.com/security/cve/CVE-2019-15031" source="CVE"/>
        <reference ref_id="CVE-2019-18660" ref_url="https://access.redhat.com/security/cve/CVE-2019-18660" source="CVE"/>
        <reference ref_id="CVE-2019-19527" ref_url="https://access.redhat.com/security/cve/CVE-2019-19527" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception (CVE-2019-15030)

* kernel: powerpc: local user can read vector registers of other users' processes via an interrupt (CVE-2019-15031)

* kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660)

* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [FJ8.1 Bug]: fs/devpts: always delete dcache dentry-s in dput() (BZ#1783959)

* qla2xxx: call dma_free_coherent with correct size in all cases in qla24xx_sp_unmap (BZ#1788206)

* qla2xxxx: Firmware update for Gen7 adapter could result in an unusable adapter (BZ#1790350)

* s390/sclp: Fix bit checked for has_sipl (BZ#1791408)

* RHEL8.1 - Error output for CPU-MF auxtrace data in perf: (BZ#1792198)

* [FJ8.0 Bug]: [kernel]: using "kexec -e" to reboot A64FX system causes system panic during the boot of the 2nd kernel (BZ#1792200)

* Fixup tlbie vs store ordering issue on POWER9 (BZ#1794058)

* RHEL8.1 - qeth: add safeguards to RX data path (BZ#1794059)

* RHEL8.1 - STC940:ZZ:Fleet:RHEL:LPM failed with no rmc connection during 6th iteration (ibmvnic) (BZ#1794060)

* RHEL8.1 - disable trace-imc feature (perf:) (BZ#1794061)

* [Broadcom RHEL8.2 FEAT]: megaraid_sas driver update request (BZ#1795335)

* RHEL8.1 pre-Beta - [ FW940 ] [ zz P9 ] kdump fails when XIVE is enabled and dump is trigged from HMC. (BZ#1795337)

* T10 DIF: OOM observed while running I/O (BZ#1795338)

* backport fix for potential deadlock relative to snapshot COW throttling (BZ#1796490)

* Neoverse n1 errata 1542419 "Core may fetch stale instructions from memory and violate ordering" (BZ#1797518)

* [HPE 8.1 Bug] hpsa: bug fix for reset issue (BZ#1797519)

* [HPE 8.0 BUG] System crash when reading /sys/block/&lt;dm&gt;/mq/0/cpu_list file (BZ#1797960)

* kernel: T10 CRC not using hardware-accelerated version from crct10dif_pclmul (BZ#1797961)

* [FJ8.1 Bug]: Dirty pages remain when write() returns ENOSPC. (BZ#1797962)

* RHEL 8 - NVMe/FC Fabric Broadcom Autoconnect Script Fails to Reconnect after Controller Reset (BZ#1798381)

* [RHEL8.2]: Chelsio crypto co-processor Driver (chcr) bugfixes (BZ#1798527)

* [RHEL8.1][Snapshot-1]LUN discovery says unrecognized (BZ#1801216)

* 8.2 snap2 kernel incorrectly signed in brew (BZ#1807231)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-20-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-15030" impact="moderate" public="20190906">CVE-2019-15030</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-15031" impact="moderate" public="20190913">CVE-2019-15031</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-18660" impact="moderate" public="20191128">CVE-2019-18660</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19527" impact="moderate" public="20190806">CVE-2019-19527</cve>
          <bugzilla href="https://bugzilla.redhat.com/1759313" id="1759313">CVE-2019-15030 kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760063" id="1760063">CVE-2019-15031 kernel: powerpc: local user can read vector registers of other users' processes via an interrupt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777825" id="1777825">CVE-2019-18660 kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783498" id="1783498">CVE-2019-19527 kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-147.8.1.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20201372051"/>
            <criterion comment="kernel earlier than 0:4.18.0-147.8.1.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20201372052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-147.8.1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201372049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201378" version="637">
      <metadata>
        <title>ALSA-2020:1378: kernel-rt security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1378" ref_url="https://errata.almalinux.org/8/ALSA-2020-1378.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1378" ref_url="https://access.redhat.com/errata/RHSA-2020:1378" source="RHSA"/>
        <reference ref_id="CVE-2019-19527" ref_url="https://access.redhat.com/security/cve/CVE-2019-19527" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.1.z3 source tree (BZ#1794136)

* [kernel-rt-debug] BUG: MAX_LOCKDEP_CHAINS too low! (BZ#1794199)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19527" impact="moderate" public="20190806">CVE-2019-19527</cve>
          <bugzilla href="https://bugzilla.redhat.com/1783498" id="1783498">CVE-2019-19527 kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.8.1.rt24.101.el8_1 is currently running" test_ref="oval:org.almalinux.alsa:tst:20201372051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-147.8.1.rt24.101.el8_1 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20201378026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-147.8.1.rt24.101.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201378023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201379" version="635">
      <metadata>
        <title>ALSA-2020:1379: container-tools:rhel8 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1379" ref_url="https://errata.almalinux.org/8/ALSA-2020-1379.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1379" ref_url="https://access.redhat.com/errata/RHSA-2020:1379" source="RHSA"/>
        <reference ref_id="CVE-2020-8608" ref_url="https://access.redhat.com/security/cve/CVE-2020-8608" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-rhel8-rhel-8.1.1] (BZ#1803495)

* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-rhel8-rhel-8.1.1/buildah] (BZ#1804188)

* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-rhel8-rhel-8.1.1/podman] (BZ#1804194)

* fuse-overlayfs segfault [stream-container-tools-rhel8-rhel-8.1.1/fuse-overlayfs] (BZ#1805016)

* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-rhel8-rhel-8.1.1/buildah] (BZ#1806119)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-07"/>
          <updated date="2020-04-07"/>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-8608" impact="important" public="20200127">CVE-2020-8608</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798453" id="1798453">CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-6.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-6.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790031"/>
              <criterion comment="buildah-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480051"/>
              <criterion comment="cockpit-podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.6-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480071"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480091"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480111"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480131"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.2-5.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202013790151"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.6.4-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790171"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.6.4-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790191"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-manpages is earlier than 0:1.6.4-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790211"/>
              <criterion comment="podman-manpages is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030242"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:1.6.4-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790231"/>
              <criterion comment="podman-remote is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:1.6.4-4.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202013790251"/>
              <criterion comment="podman-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202003480271"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202003480272"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc9.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480291"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480311"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.40-8.module_el8.1.0+298+41f9343a" test_ref="oval:org.almalinux.alsa:tst:202003480331"/>
              <criterion comment="skopeo-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202013790351"/>
              <criterion comment="slirp4netns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.4-1.module_el8.1.0+293+ad8ef41f" test_ref="oval:org.almalinux.alsa:tst:202003480371"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202003480391"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201406" version="638">
      <metadata>
        <title>ALSA-2020:1406: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1406" ref_url="https://errata.almalinux.org/8/ALSA-2020-1406.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1406" ref_url="https://access.redhat.com/errata/RHSA-2020:1406" source="RHSA"/>
        <reference ref_id="CVE-2020-6821" ref_url="https://access.redhat.com/security/cve/CVE-2020-6821" source="CVE"/>
        <reference ref_id="CVE-2020-6822" ref_url="https://access.redhat.com/security/cve/CVE-2020-6822" source="CVE"/>
        <reference ref_id="CVE-2020-6825" ref_url="https://access.redhat.com/security/cve/CVE-2020-6825" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.7.0 ESR.

Security Fix(es):

* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821)

* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825)

* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-08"/>
          <updated date="2020-04-08"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-6821" impact="important" public="20200408">CVE-2020-6821</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-6822" impact="moderate" public="20200408">CVE-2020-6822</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6825" impact="important" public="20200408">CVE-2020-6825</cve>
          <bugzilla href="https://bugzilla.redhat.com/1821674" id="1821674">CVE-2020-6821 Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1821676" id="1821676">CVE-2020-6822 Mozilla: Out of bounds write in GMPDecodeData when processing large images</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1821682" id="1821682">CVE-2020-6825 Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.7.0-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201406001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201495" version="636">
      <metadata>
        <title>ALSA-2020:1495: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1495" ref_url="https://errata.almalinux.org/8/ALSA-2020-1495.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1495" ref_url="https://access.redhat.com/errata/RHSA-2020:1495" source="RHSA"/>
        <reference ref_id="CVE-2020-6819" ref_url="https://access.redhat.com/security/cve/CVE-2020-6819" source="CVE"/>
        <reference ref_id="CVE-2020-6820" ref_url="https://access.redhat.com/security/cve/CVE-2020-6820" source="CVE"/>
        <reference ref_id="CVE-2020-6821" ref_url="https://access.redhat.com/security/cve/CVE-2020-6821" source="CVE"/>
        <reference ref_id="CVE-2020-6822" ref_url="https://access.redhat.com/security/cve/CVE-2020-6822" source="CVE"/>
        <reference ref_id="CVE-2020-6825" ref_url="https://access.redhat.com/security/cve/CVE-2020-6825" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.7.0.

Security Fix(es):

* Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819)

* Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820)

* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821)

* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825)

* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-16"/>
          <updated date="2020-04-16"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6819" impact="critical" public="20200403">CVE-2020-6819</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6820" impact="critical" public="20200403">CVE-2020-6820</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-6821" impact="important" public="20200408">CVE-2020-6821</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-6822" impact="moderate" public="20200408">CVE-2020-6822</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6825" impact="important" public="20200408">CVE-2020-6825</cve>
          <bugzilla href="https://bugzilla.redhat.com/1820869" id="1820869">CVE-2020-6819 Mozilla: Use-after-free while running the nsDocShell destructor</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820878" id="1820878">CVE-2020-6820 Mozilla: Use-after-free when handling a ReadableStream</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1821674" id="1821674">CVE-2020-6821 Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1821676" id="1821676">CVE-2020-6822 Mozilla: Out of bounds write in GMPDecodeData when processing large images</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1821682" id="1821682">CVE-2020-6825 Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.7.0-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201495001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201497" version="636">
      <metadata>
        <title>ALSA-2020:1497: tigervnc security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1497" ref_url="https://errata.almalinux.org/8/ALSA-2020-1497.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1497" ref_url="https://access.redhat.com/errata/RHSA-2020:1497" source="RHSA"/>
        <reference ref_id="CVE-2019-15691" ref_url="https://access.redhat.com/security/cve/CVE-2019-15691" source="CVE"/>
        <reference ref_id="CVE-2019-15692" ref_url="https://access.redhat.com/security/cve/CVE-2019-15692" source="CVE"/>
        <reference ref_id="CVE-2019-15693" ref_url="https://access.redhat.com/security/cve/CVE-2019-15693" source="CVE"/>
        <reference ref_id="CVE-2019-15694" ref_url="https://access.redhat.com/security/cve/CVE-2019-15694" source="CVE"/>
        <reference ref_id="CVE-2019-15695" ref_url="https://access.redhat.com/security/cve/CVE-2019-15695" source="CVE"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder (CVE-2019-15691)

* tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks (CVE-2019-15692)

* tigervnc: Heap buffer overflow in TightDecoder::FilterGradient (CVE-2019-15693)

* tigervnc: Heap buffer overflow in DecodeManager::decodeRect (CVE-2019-15694)

* tigervnc: Stack buffer overflow in CMsgReader::readSetCursor (CVE-2019-15695)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-16"/>
          <updated date="2020-04-16"/>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-672" href="https://access.redhat.com/security/cve/CVE-2019-15691" impact="moderate" public="20191220">CVE-2019-15691</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-15692" impact="moderate" public="20190910">CVE-2019-15692</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-15693" impact="moderate" public="20191220">CVE-2019-15693</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-15694" impact="moderate" public="20191220">CVE-2019-15694</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-15695" impact="moderate" public="20191220">CVE-2019-15695</cve>
          <bugzilla href="https://bugzilla.redhat.com/1789527" id="1789527">CVE-2019-15692 tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789908" id="1789908">CVE-2019-15691 tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790313" id="1790313">CVE-2019-15693 tigervnc: Heap buffer overflow in TightDecoder::FilterGradient</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790315" id="1790315">CVE-2019-15694 tigervnc: Heap buffer overflow in DecodeManager::decodeRect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790318" id="1790318">CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="tigervnc is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497001"/>
              <criterion comment="tigervnc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-icons is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497003"/>
              <criterion comment="tigervnc-icons is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-license is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497005"/>
              <criterion comment="tigervnc-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-server is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497007"/>
              <criterion comment="tigervnc-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-server-applet is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497009"/>
              <criterion comment="tigervnc-server-applet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-server-minimal is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497011"/>
              <criterion comment="tigervnc-server-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tigervnc-server-module is earlier than 0:1.9.0-14.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201497013"/>
              <criterion comment="tigervnc-server-module is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201497014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201513" version="636">
      <metadata>
        <title>ALSA-2020:1513: git security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1513" ref_url="https://errata.almalinux.org/8/ALSA-2020-1513.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1513" ref_url="https://access.redhat.com/errata/RHSA-2020:1513" source="RHSA"/>
        <reference ref_id="CVE-2020-5260" ref_url="https://access.redhat.com/security/cve/CVE-2020-5260" source="CVE"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: Crafted URL containing new lines can cause credential leak (CVE-2020-5260)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-21"/>
          <updated date="2020-04-21"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-5260" impact="important" public="20200414:1800">CVE-2020-5260</cve>
          <bugzilla href="https://bugzilla.redhat.com/1822020" id="1822020">CVE-2020-5260 git: Crafted URL containing new lines can cause credential leak</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="git is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513001"/>
              <criterion comment="git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-all is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513003"/>
              <criterion comment="git-all is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513005"/>
              <criterion comment="git-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core-doc is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513007"/>
              <criterion comment="git-core-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-daemon is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513009"/>
              <criterion comment="git-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-email is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513011"/>
              <criterion comment="git-email is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-gui is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513013"/>
              <criterion comment="git-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-instaweb is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513015"/>
              <criterion comment="git-instaweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-subtree is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513017"/>
              <criterion comment="git-subtree is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-svn is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513019"/>
              <criterion comment="git-svn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitk is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513021"/>
              <criterion comment="gitk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitweb is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513023"/>
              <criterion comment="gitweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513025"/>
              <criterion comment="perl-Git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git-SVN is earlier than 0:2.18.2-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201513027"/>
              <criterion comment="perl-Git-SVN is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356028"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201514" version="636">
      <metadata>
        <title>ALSA-2020:1514: java-11-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1514" ref_url="https://errata.almalinux.org/8/ALSA-2020-1514.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1514" ref_url="https://access.redhat.com/errata/RHSA-2020:1514" source="RHSA"/>
        <reference ref_id="CVE-2020-2754" ref_url="https://access.redhat.com/security/cve/CVE-2020-2754" source="CVE"/>
        <reference ref_id="CVE-2020-2755" ref_url="https://access.redhat.com/security/cve/CVE-2020-2755" source="CVE"/>
        <reference ref_id="CVE-2020-2756" ref_url="https://access.redhat.com/security/cve/CVE-2020-2756" source="CVE"/>
        <reference ref_id="CVE-2020-2757" ref_url="https://access.redhat.com/security/cve/CVE-2020-2757" source="CVE"/>
        <reference ref_id="CVE-2020-2767" ref_url="https://access.redhat.com/security/cve/CVE-2020-2767" source="CVE"/>
        <reference ref_id="CVE-2020-2773" ref_url="https://access.redhat.com/security/cve/CVE-2020-2773" source="CVE"/>
        <reference ref_id="CVE-2020-2778" ref_url="https://access.redhat.com/security/cve/CVE-2020-2778" source="CVE"/>
        <reference ref_id="CVE-2020-2781" ref_url="https://access.redhat.com/security/cve/CVE-2020-2781" source="CVE"/>
        <reference ref_id="CVE-2020-2800" ref_url="https://access.redhat.com/security/cve/CVE-2020-2800" source="CVE"/>
        <reference ref_id="CVE-2020-2803" ref_url="https://access.redhat.com/security/cve/CVE-2020-2803" source="CVE"/>
        <reference ref_id="CVE-2020-2805" ref_url="https://access.redhat.com/security/cve/CVE-2020-2805" source="CVE"/>
        <reference ref_id="CVE-2020-2816" ref_url="https://access.redhat.com/security/cve/CVE-2020-2816" source="CVE"/>
        <reference ref_id="CVE-2020-2830" ref_url="https://access.redhat.com/security/cve/CVE-2020-2830" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803)

* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805)

* OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) (CVE-2020-2816)

* OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) (CVE-2020-2767)

* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773)

* OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) (CVE-2020-2778)

* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781)

* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800)

* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830)

* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)

* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755)

* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756)

* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-21"/>
          <updated date="2020-04-21"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2754" impact="low" public="20200414">CVE-2020-2754</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2755" impact="low" public="20200414">CVE-2020-2755</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2756" impact="low" public="20200414">CVE-2020-2756</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2757" impact="low" public="20200414">CVE-2020-2757</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-2767" impact="moderate" public="20200414">CVE-2020-2767</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2773" impact="moderate" public="20200414">CVE-2020-2773</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-2778" impact="moderate" public="20200414">CVE-2020-2778</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2020-2781" impact="moderate" public="20200414">CVE-2020-2781</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2020-2800" impact="moderate" public="20200414">CVE-2020-2800</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-2803" impact="important" public="20200414">CVE-2020-2803</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2805" impact="important" public="20200414">CVE-2020-2805</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-2816" impact="important" public="20200414">CVE-2020-2816</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-185-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2830" impact="moderate" public="20200414">CVE-2020-2830</cve>
          <bugzilla href="https://bugzilla.redhat.com/1823199" id="1823199">CVE-2020-2754 OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823200" id="1823200">CVE-2020-2755 OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823215" id="1823215">CVE-2020-2756 OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823216" id="1823216">CVE-2020-2757 OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823224" id="1823224">CVE-2020-2773 OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823527" id="1823527">CVE-2020-2800 OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823542" id="1823542">CVE-2020-2830 OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823694" id="1823694">CVE-2020-2803 OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823844" id="1823844">CVE-2020-2805 OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823853" id="1823853">CVE-2020-2816 OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823879" id="1823879">CVE-2020-2778 OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823947" id="1823947">CVE-2020-2767 OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823960" id="1823960">CVE-2020-2781 OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.7.10-1.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201514015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201515" version="635">
      <metadata>
        <title>ALSA-2020:1515: java-1.8.0-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1515" ref_url="https://errata.almalinux.org/8/ALSA-2020-1515.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1515" ref_url="https://access.redhat.com/errata/RHSA-2020:1515" source="RHSA"/>
        <reference ref_id="CVE-2020-2754" ref_url="https://access.redhat.com/security/cve/CVE-2020-2754" source="CVE"/>
        <reference ref_id="CVE-2020-2755" ref_url="https://access.redhat.com/security/cve/CVE-2020-2755" source="CVE"/>
        <reference ref_id="CVE-2020-2756" ref_url="https://access.redhat.com/security/cve/CVE-2020-2756" source="CVE"/>
        <reference ref_id="CVE-2020-2757" ref_url="https://access.redhat.com/security/cve/CVE-2020-2757" source="CVE"/>
        <reference ref_id="CVE-2020-2773" ref_url="https://access.redhat.com/security/cve/CVE-2020-2773" source="CVE"/>
        <reference ref_id="CVE-2020-2781" ref_url="https://access.redhat.com/security/cve/CVE-2020-2781" source="CVE"/>
        <reference ref_id="CVE-2020-2800" ref_url="https://access.redhat.com/security/cve/CVE-2020-2800" source="CVE"/>
        <reference ref_id="CVE-2020-2803" ref_url="https://access.redhat.com/security/cve/CVE-2020-2803" source="CVE"/>
        <reference ref_id="CVE-2020-2805" ref_url="https://access.redhat.com/security/cve/CVE-2020-2805" source="CVE"/>
        <reference ref_id="CVE-2020-2830" ref_url="https://access.redhat.com/security/cve/CVE-2020-2830" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803)

* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805)

* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773)

* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781)

* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800)

* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830)

* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)

* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755)

* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756)

* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-22"/>
          <updated date="2020-04-22"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2754" impact="low" public="20200414">CVE-2020-2754</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2755" impact="low" public="20200414">CVE-2020-2755</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2756" impact="low" public="20200414">CVE-2020-2756</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2757" impact="low" public="20200414">CVE-2020-2757</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2773" impact="moderate" public="20200414">CVE-2020-2773</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2020-2781" impact="moderate" public="20200414">CVE-2020-2781</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2020-2800" impact="moderate" public="20200414">CVE-2020-2800</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-2803" impact="important" public="20200414">CVE-2020-2803</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2805" impact="important" public="20200414">CVE-2020-2805</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-185-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2830" impact="moderate" public="20200414">CVE-2020-2830</cve>
          <bugzilla href="https://bugzilla.redhat.com/1823199" id="1823199">CVE-2020-2754 OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823200" id="1823200">CVE-2020-2755 OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823215" id="1823215">CVE-2020-2756 OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823216" id="1823216">CVE-2020-2757 OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823224" id="1823224">CVE-2020-2773 OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823527" id="1823527">CVE-2020-2800 OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823542" id="1823542">CVE-2020-2830 OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823694" id="1823694">CVE-2020-2803 OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823844" id="1823844">CVE-2020-2805 OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823960" id="1823960">CVE-2020-2781 OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.252.b09-2.el8_1" test_ref="oval:org.almalinux.alsa:tst:20201515015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201567" version="641">
      <metadata>
        <title>ALSA-2020:1567: kernel-rt security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1567" ref_url="https://errata.almalinux.org/8/ALSA-2020-1567.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1567" ref_url="https://access.redhat.com/errata/RHSA-2020:1567" source="RHSA"/>
        <reference ref_id="CVE-2018-16871" ref_url="https://access.redhat.com/security/cve/CVE-2018-16871" source="CVE"/>
        <reference ref_id="CVE-2019-10639" ref_url="https://access.redhat.com/security/cve/CVE-2019-10639" source="CVE"/>
        <reference ref_id="CVE-2019-12819" ref_url="https://access.redhat.com/security/cve/CVE-2019-12819" source="CVE"/>
        <reference ref_id="CVE-2019-15090" ref_url="https://access.redhat.com/security/cve/CVE-2019-15090" source="CVE"/>
        <reference ref_id="CVE-2019-15099" ref_url="https://access.redhat.com/security/cve/CVE-2019-15099" source="CVE"/>
        <reference ref_id="CVE-2019-15221" ref_url="https://access.redhat.com/security/cve/CVE-2019-15221" source="CVE"/>
        <reference ref_id="CVE-2019-15223" ref_url="https://access.redhat.com/security/cve/CVE-2019-15223" source="CVE"/>
        <reference ref_id="CVE-2019-16234" ref_url="https://access.redhat.com/security/cve/CVE-2019-16234" source="CVE"/>
        <reference ref_id="CVE-2019-17053" ref_url="https://access.redhat.com/security/cve/CVE-2019-17053" source="CVE"/>
        <reference ref_id="CVE-2019-17055" ref_url="https://access.redhat.com/security/cve/CVE-2019-17055" source="CVE"/>
        <reference ref_id="CVE-2019-18282" ref_url="https://access.redhat.com/security/cve/CVE-2019-18282" source="CVE"/>
        <reference ref_id="CVE-2019-18805" ref_url="https://access.redhat.com/security/cve/CVE-2019-18805" source="CVE"/>
        <reference ref_id="CVE-2019-19045" ref_url="https://access.redhat.com/security/cve/CVE-2019-19045" source="CVE"/>
        <reference ref_id="CVE-2019-19047" ref_url="https://access.redhat.com/security/cve/CVE-2019-19047" source="CVE"/>
        <reference ref_id="CVE-2019-19055" ref_url="https://access.redhat.com/security/cve/CVE-2019-19055" source="CVE"/>
        <reference ref_id="CVE-2019-19057" ref_url="https://access.redhat.com/security/cve/CVE-2019-19057" source="CVE"/>
        <reference ref_id="CVE-2019-19058" ref_url="https://access.redhat.com/security/cve/CVE-2019-19058" source="CVE"/>
        <reference ref_id="CVE-2019-19059" ref_url="https://access.redhat.com/security/cve/CVE-2019-19059" source="CVE"/>
        <reference ref_id="CVE-2019-19065" ref_url="https://access.redhat.com/security/cve/CVE-2019-19065" source="CVE"/>
        <reference ref_id="CVE-2019-19067" ref_url="https://access.redhat.com/security/cve/CVE-2019-19067" source="CVE"/>
        <reference ref_id="CVE-2019-19073" ref_url="https://access.redhat.com/security/cve/CVE-2019-19073" source="CVE"/>
        <reference ref_id="CVE-2019-19074" ref_url="https://access.redhat.com/security/cve/CVE-2019-19074" source="CVE"/>
        <reference ref_id="CVE-2019-19077" ref_url="https://access.redhat.com/security/cve/CVE-2019-19077" source="CVE"/>
        <reference ref_id="CVE-2019-19532" ref_url="https://access.redhat.com/security/cve/CVE-2019-19532" source="CVE"/>
        <reference ref_id="CVE-2019-19534" ref_url="https://access.redhat.com/security/cve/CVE-2019-19534" source="CVE"/>
        <reference ref_id="CVE-2019-19768" ref_url="https://access.redhat.com/security/cve/CVE-2019-19768" source="CVE"/>
        <reference ref_id="CVE-2019-19922" ref_url="https://access.redhat.com/security/cve/CVE-2019-19922" source="CVE"/>
        <reference ref_id="CVE-2019-5108" ref_url="https://access.redhat.com/security/cve/CVE-2019-5108" source="CVE"/>
        <reference ref_id="CVE-2019-8980" ref_url="https://access.redhat.com/security/cve/CVE-2019-8980" source="CVE"/>
        <reference ref_id="CVE-2020-10690" ref_url="https://access.redhat.com/security/cve/CVE-2020-10690" source="CVE"/>
        <reference ref_id="CVE-2020-1749" ref_url="https://access.redhat.com/security/cve/CVE-2020-1749" source="CVE"/>
        <reference ref_id="CVE-2020-7053" ref_url="https://access.redhat.com/security/cve/CVE-2020-7053" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)

* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)

* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)

* kernel: unprivileged users able to create RAW sockets  in AF_IEEE802154 network protocol. (CVE-2019-17053)

* kernel: unprivileged users able to create RAW sockets in AF_ISDN  network protocol. (CVE-2019-17055)

* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)

* kernel: information leak bug caused  by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)

* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)

* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)

* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)

* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)

* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)

* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)

* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)

* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)

* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)

* KVM-RT guest fails boot with emulatorsched (BZ#1712781)

* 8 vCPU guest need max latency &lt; 20 us with stress [RT-8.2] (BZ#1757165)

* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)

* RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)

* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)

Enhancement(s):

* update to the upstream 5.x RT patchset (BZ#1680161)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-16871" impact="moderate" public="20190603:0223">CVE-2018-16871</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10639" impact="low" public="20190715">CVE-2019-10639</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-12819" impact="moderate" public="20190613">CVE-2019-12819</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-15090" impact="low" public="20190820">CVE-2019-15090</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-15099" impact="low" public="20190820">CVE-2019-15099</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15221" impact="low" public="20190802">CVE-2019-15221</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15223" impact="low" public="20190802">CVE-2019-15223</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16234" impact="low" public="20190909">CVE-2019-16234</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-17053" impact="moderate" public="20190920">CVE-2019-17053</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-17055" impact="moderate" public="20190920">CVE-2019-17055</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-18282" impact="moderate" public="20191022">CVE-2019-18282</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-18805" impact="moderate" public="20190416">CVE-2019-18805</cve>
          <cve cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19045" impact="moderate" public="20191118">CVE-2019-19045</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19047" impact="low" public="20191118">CVE-2019-19047</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19055" impact="moderate" public="20191005">CVE-2019-19055</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19057" impact="low" public="20191121">CVE-2019-19057</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19058" impact="low" public="20191121">CVE-2019-19058</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19059" impact="low" public="20191121">CVE-2019-19059</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19065" impact="low" public="20191121">CVE-2019-19065</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19067" impact="low" public="20191121">CVE-2019-19067</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19073" impact="low" public="20191121">CVE-2019-19073</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-19074" impact="low" public="20191121">CVE-2019-19074</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19077" impact="moderate" public="20190910">CVE-2019-19077</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-19532" impact="moderate" public="20191203">CVE-2019-19532</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-772-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-19534" impact="moderate" public="20191104">CVE-2019-19534</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19768" impact="important" public="20191129">CVE-2019-19768</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19922" impact="low" public="20191222">CVE-2019-19922</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2019-5108" impact="moderate" public="20191211">CVE-2019-5108</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-8980" impact="moderate" public="20190218">CVE-2019-8980</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10690" impact="low" public="20191125:1253">CVE-2020-10690</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-319" href="https://access.redhat.com/security/cve/CVE-2020-1749" impact="moderate" public="20200304:0129">CVE-2020-1749</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-7053" impact="moderate" public="20200114">CVE-2020-7053</cve>
          <bugzilla href="https://bugzilla.redhat.com/1655162" id="1655162">CVE-2018-16871 kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1679972" id="1679972">CVE-2019-8980 kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1721962" id="1721962">CVE-2019-12819 kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1729933" id="1729933">CVE-2019-10639 Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743526" id="1743526">CVE-2019-15090 kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743560" id="1743560">CVE-2019-15099 kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749974" id="1749974">CVE-2019-15221 kernel: Null pointer dereference in the sound/usb/line6/pcm.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749976" id="1749976">CVE-2019-15223 kernel: Null pointer dereference in the sound/usb/line6/driver.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758242" id="1758242">CVE-2019-17053 kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758248" id="1758248">CVE-2019-17055 kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760441" id="1760441">CVE-2019-16234 kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1771496" id="1771496">CVE-2019-18805 kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774933" id="1774933">CVE-2019-19074 kernel: a memory leak in the ath9k management function in allows local DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774937" id="1774937">CVE-2019-19073 kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774968" id="1774968">CVE-2019-19067 kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774983" id="1774983">CVE-2019-19045 kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774991" id="1774991">CVE-2019-19047 kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775000" id="1775000">CVE-2019-19065 kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775042" id="1775042">CVE-2019-19059 kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775047" id="1775047">CVE-2019-19058 kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775050" id="1775050">CVE-2019-19057 kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775074" id="1775074">CVE-2019-19055 kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775724" id="1775724">CVE-2019-19077 kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781821" id="1781821">CVE-2019-19532 kernel: malicious USB devices can lead to multiple out-of-bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783540" id="1783540">CVE-2019-19534 kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786164" id="1786164">CVE-2019-19768 kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789927" id="1789927">CVE-2019-5108 kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1792512" id="1792512">CVE-2019-19922 kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1795624" id="1795624">CVE-2020-7053 kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796360" id="1796360">CVE-2019-18282 kernel: The flow_dissector feature allows device tracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809833" id="1809833">CVE-2020-1749 kernel: some ipv6 protocols not encrypted over ipsec tunnel</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1817141" id="1817141">CVE-2020-10690 kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.rt13.51.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20201567025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.rt13.51.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20201567026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.rt13.51.el8" test_ref="oval:org.almalinux.alsa:tst:20201567023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201576" version="636">
      <metadata>
        <title>ALSA-2020:1576: memcached security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1576" ref_url="https://errata.almalinux.org/8/ALSA-2020-1576.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1576" ref_url="https://access.redhat.com/errata/RHSA-2020:1576" source="RHSA"/>
        <reference ref_id="CVE-2019-11596" ref_url="https://access.redhat.com/security/cve/CVE-2019-11596" source="CVE"/>
        <description>memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. 

Security Fix(es):

* memcached: null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service (CVE-2019-11596)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-11596" impact="moderate" public="20190410">CVE-2019-11596</cve>
          <bugzilla href="https://bugzilla.redhat.com/1706001" id="1706001">CVE-2019-11596 memcached: null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="memcached is earlier than 0:1.5.9-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201576001"/>
          <criterion comment="memcached is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201576002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201577" version="637">
      <metadata>
        <title>ALSA-2020:1577: exiv2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1577" ref_url="https://errata.almalinux.org/8/ALSA-2020-1577.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1577" ref_url="https://access.redhat.com/errata/RHSA-2020:1577" source="RHSA"/>
        <reference ref_id="CVE-2017-18005" ref_url="https://access.redhat.com/security/cve/CVE-2017-18005" source="CVE"/>
        <reference ref_id="CVE-2018-10772" ref_url="https://access.redhat.com/security/cve/CVE-2018-10772" source="CVE"/>
        <reference ref_id="CVE-2018-11037" ref_url="https://access.redhat.com/security/cve/CVE-2018-11037" source="CVE"/>
        <reference ref_id="CVE-2018-14338" ref_url="https://access.redhat.com/security/cve/CVE-2018-14338" source="CVE"/>
        <reference ref_id="CVE-2018-17229" ref_url="https://access.redhat.com/security/cve/CVE-2018-17229" source="CVE"/>
        <reference ref_id="CVE-2018-17230" ref_url="https://access.redhat.com/security/cve/CVE-2018-17230" source="CVE"/>
        <reference ref_id="CVE-2018-17282" ref_url="https://access.redhat.com/security/cve/CVE-2018-17282" source="CVE"/>
        <reference ref_id="CVE-2018-17581" ref_url="https://access.redhat.com/security/cve/CVE-2018-17581" source="CVE"/>
        <reference ref_id="CVE-2018-18915" ref_url="https://access.redhat.com/security/cve/CVE-2018-18915" source="CVE"/>
        <reference ref_id="CVE-2018-19107" ref_url="https://access.redhat.com/security/cve/CVE-2018-19107" source="CVE"/>
        <reference ref_id="CVE-2018-19108" ref_url="https://access.redhat.com/security/cve/CVE-2018-19108" source="CVE"/>
        <reference ref_id="CVE-2018-19535" ref_url="https://access.redhat.com/security/cve/CVE-2018-19535" source="CVE"/>
        <reference ref_id="CVE-2018-19607" ref_url="https://access.redhat.com/security/cve/CVE-2018-19607" source="CVE"/>
        <reference ref_id="CVE-2018-20096" ref_url="https://access.redhat.com/security/cve/CVE-2018-20096" source="CVE"/>
        <reference ref_id="CVE-2018-20097" ref_url="https://access.redhat.com/security/cve/CVE-2018-20097" source="CVE"/>
        <reference ref_id="CVE-2018-20098" ref_url="https://access.redhat.com/security/cve/CVE-2018-20098" source="CVE"/>
        <reference ref_id="CVE-2018-20099" ref_url="https://access.redhat.com/security/cve/CVE-2018-20099" source="CVE"/>
        <reference ref_id="CVE-2018-4868" ref_url="https://access.redhat.com/security/cve/CVE-2018-4868" source="CVE"/>
        <reference ref_id="CVE-2018-9303" ref_url="https://access.redhat.com/security/cve/CVE-2018-9303" source="CVE"/>
        <reference ref_id="CVE-2018-9304" ref_url="https://access.redhat.com/security/cve/CVE-2018-9304" source="CVE"/>
        <reference ref_id="CVE-2018-9305" ref_url="https://access.redhat.com/security/cve/CVE-2018-9305" source="CVE"/>
        <reference ref_id="CVE-2018-9306" ref_url="https://access.redhat.com/security/cve/CVE-2018-9306" source="CVE"/>
        <reference ref_id="CVE-2019-13109" ref_url="https://access.redhat.com/security/cve/CVE-2019-13109" source="CVE"/>
        <reference ref_id="CVE-2019-13111" ref_url="https://access.redhat.com/security/cve/CVE-2019-13111" source="CVE"/>
        <reference ref_id="CVE-2019-13112" ref_url="https://access.redhat.com/security/cve/CVE-2019-13112" source="CVE"/>
        <reference ref_id="CVE-2019-13113" ref_url="https://access.redhat.com/security/cve/CVE-2019-13113" source="CVE"/>
        <reference ref_id="CVE-2019-13114" ref_url="https://access.redhat.com/security/cve/CVE-2019-13114" source="CVE"/>
        <reference ref_id="CVE-2019-20421" ref_url="https://access.redhat.com/security/cve/CVE-2019-20421" source="CVE"/>
        <reference ref_id="CVE-2019-9143" ref_url="https://access.redhat.com/security/cve/CVE-2019-9143" source="CVE"/>
        <description>The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments.

The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917)

Security Fix(es):

* exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421)

* exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005)

* exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868)

* exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303)

* exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304)

* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305)

* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772)

* exiv2: information leak via a crafted file (CVE-2018-11037)

* exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338)

* exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229)

* exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230)

* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282)

* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581)

* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915)

* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107)

* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108)

* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535)

* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607)

* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096)

* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097)

* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098)

* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)

* exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143)

* exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109)

* exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111)

* exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112)

* exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113)

* exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114)

* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="(CWE-476|CWE-617)" href="https://access.redhat.com/security/cve/CVE-2017-18005" impact="low" public="20171118">CVE-2017-18005</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-10772" impact="low" public="20180412">CVE-2018-10772</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2018-11037" impact="low" public="20180513">CVE-2018-11037</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-14338" impact="low" public="20180714">CVE-2018-14338</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2018-17229" impact="low" public="20180917">CVE-2018-17229</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-17230" impact="low" public="20180917">CVE-2018-17230</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-17282" impact="low" public="20180920">CVE-2018-17282</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-17581" impact="low" public="20180925">CVE-2018-17581</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-18915" impact="low" public="20181102">CVE-2018-18915</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19107" impact="low" public="20180901">CVE-2018-19107</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-19108" impact="low" public="20180831">CVE-2018-19108</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19535" impact="low" public="20180901">CVE-2018-19535</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-19607" impact="low" public="20181123">CVE-2018-19607</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-20096" impact="low" public="20181210">CVE-2018-20096</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-20097" impact="low" public="20181210">CVE-2018-20097</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-20098" impact="low" public="20181210">CVE-2018-20098</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-20099" impact="low" public="20181210">CVE-2018-20099</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-4868" impact="low" public="20180201">CVE-2018-4868</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-9303" impact="low" public="20180404">CVE-2018-9303</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2018-9304" impact="low" public="20180404">CVE-2018-9304</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-9305" impact="low" public="20180404">CVE-2018-9305</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-9306" public="20180404">CVE-2018-9306</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13109" impact="low" public="20190630">CVE-2019-13109</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13111" impact="low" public="20190630">CVE-2019-13111</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13112" impact="low" public="20190630">CVE-2019-13112</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2019-13113" impact="low" public="20190630">CVE-2019-13113</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-13114" impact="low" public="20190630">CVE-2019-13114</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-20421" impact="moderate" public="20190930">CVE-2019-20421</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-9143" impact="low" public="20190221">CVE-2019-9143</cve>
          <bugzilla href="https://bugzilla.redhat.com/1531171" id="1531171">CVE-2017-18005 exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1531724" id="1531724">CVE-2018-4868 exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1566725" id="1566725">CVE-2018-9303 exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1566731" id="1566731">CVE-2018-9304 exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1566735" id="1566735">CVE-2018-9305 exiv2: out of bounds read in IptcData::printStructure in iptc.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1566737" id="1566737">CVE-2018-9306 exiv2: out of bounds read in IptcData::printStructure in iptc.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1579544" id="1579544">CVE-2018-11037 exiv2: information leak via a crafted file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1594627" id="1594627">CVE-2018-10772 exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1609396" id="1609396">CVE-2018-14338 exiv2: buffer overflow in samples/geotag.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1632481" id="1632481">CVE-2018-17229 exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1632484" id="1632484">CVE-2018-17230 exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1632490" id="1632490">CVE-2018-17282 exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1635045" id="1635045">CVE-2018-17581 exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1646555" id="1646555">CVE-2018-18915 exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1649094" id="1649094">CVE-2018-19107 exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1649101" id="1649101">CVE-2018-19108 exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1656187" id="1656187">CVE-2018-19535 exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1656195" id="1656195">CVE-2018-19607 exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660423" id="1660423">CVE-2018-20096 exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660424" id="1660424">CVE-2018-20097 exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660425" id="1660425">CVE-2018-20098 exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1660426" id="1660426">CVE-2018-20099 exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1684381" id="1684381">CVE-2019-9143 exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728484" id="1728484">CVE-2019-13109 exiv2: denial of service in PngImage::readMetadata</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728488" id="1728488">CVE-2019-13111 exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728490" id="1728490">CVE-2019-13112 exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728492" id="1728492">CVE-2019-13113 exiv2: invalid data location in CRW image file causing denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728494" id="1728494">CVE-2019-13114 exiv2: null-pointer dereference in http.c causing denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800472" id="1800472">CVE-2019-20421 exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnome-color-manager is earlier than 0:3.28.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201577001"/>
              <criterion comment="gnome-color-manager is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgexiv2 is earlier than 0:0.10.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201577003"/>
              <criterion comment="libgexiv2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgexiv2-devel is earlier than 0:0.10.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201577005"/>
              <criterion comment="libgexiv2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gegl is earlier than 0:0.2.0-39.el8" test_ref="oval:org.almalinux.alsa:tst:20201577007"/>
              <criterion comment="gegl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="exiv2 is earlier than 0:0.27.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201577009"/>
              <criterion comment="exiv2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="exiv2-devel is earlier than 0:0.27.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201577011"/>
              <criterion comment="exiv2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="exiv2-doc is earlier than 0:0.27.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201577013"/>
              <criterion comment="exiv2-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="exiv2-libs is earlier than 0:0.27.2-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201577015"/>
              <criterion comment="exiv2-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201577016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201581" version="636">
      <metadata>
        <title>ALSA-2020:1581: wavpack security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1581" ref_url="https://errata.almalinux.org/8/ALSA-2020-1581.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1581" ref_url="https://access.redhat.com/errata/RHSA-2020:1581" source="RHSA"/>
        <reference ref_id="CVE-2018-19840" ref_url="https://access.redhat.com/security/cve/CVE-2018-19840" source="CVE"/>
        <reference ref_id="CVE-2018-19841" ref_url="https://access.redhat.com/security/cve/CVE-2018-19841" source="CVE"/>
        <reference ref_id="CVE-2019-1010315" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010315" source="CVE"/>
        <reference ref_id="CVE-2019-1010317" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010317" source="CVE"/>
        <reference ref_id="CVE-2019-1010319" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010319" source="CVE"/>
        <reference ref_id="CVE-2019-11498" ref_url="https://access.redhat.com/security/cve/CVE-2019-11498" source="CVE"/>
        <description>WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. 

Security Fix(es):

* wawpack: Infinite loop in WavpackPackInit function lead to DoS (CVE-2018-19840)

* wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS (CVE-2018-19841)

* wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS (CVE-2019-11498)

* wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash (CVE-2019-1010315)

* wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS (CVE-2019-1010317)

* wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS (CVE-2019-1010319)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-19840" impact="low" public="20181126">CVE-2018-19840</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19841" impact="low" public="20181129">CVE-2018-19841</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2019-1010315" impact="low" public="20190712">CVE-2019-1010315</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-20-&gt;CWE-665" href="https://access.redhat.com/security/cve/CVE-2019-1010317" impact="low" public="20190806">CVE-2019-1010317</cve>
          <cve cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-665-&gt;CWE-369" href="https://access.redhat.com/security/cve/CVE-2019-1010319" impact="low" public="20190806">CVE-2019-1010319</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-456" href="https://access.redhat.com/security/cve/CVE-2019-11498" impact="low" public="20190305">CVE-2019-11498</cve>
          <bugzilla href="https://bugzilla.redhat.com/1661448" id="1661448">CVE-2018-19840 wawpack: Infinite loop in WavpackPackInit function lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1661449" id="1661449">CVE-2018-19841 wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1704633" id="1704633">CVE-2019-11498 wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1729418" id="1729418">CVE-2019-1010315 wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1737740" id="1737740">CVE-2019-1010319 wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1737747" id="1737747">CVE-2019-1010317 wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="wavpack is earlier than 0:5.1.0-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201581001"/>
              <criterion comment="wavpack is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201581002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="wavpack-devel is earlier than 0:5.1.0-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201581003"/>
              <criterion comment="wavpack-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201581004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201598" version="638">
      <metadata>
        <title>ALSA-2020:1598: libreoffice security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1598" ref_url="https://errata.almalinux.org/8/ALSA-2020-1598.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1598" ref_url="https://access.redhat.com/errata/RHSA-2020:1598" source="RHSA"/>
        <reference ref_id="CVE-2019-9849" ref_url="https://access.redhat.com/security/cve/CVE-2019-9849" source="CVE"/>
        <reference ref_id="CVE-2019-9850" ref_url="https://access.redhat.com/security/cve/CVE-2019-9850" source="CVE"/>
        <reference ref_id="CVE-2019-9851" ref_url="https://access.redhat.com/security/cve/CVE-2019-9851" source="CVE"/>
        <reference ref_id="CVE-2019-9852" ref_url="https://access.redhat.com/security/cve/CVE-2019-9852" source="CVE"/>
        <reference ref_id="CVE-2019-9853" ref_url="https://access.redhat.com/security/cve/CVE-2019-9853" source="CVE"/>
        <reference ref_id="CVE-2019-9854" ref_url="https://access.redhat.com/security/cve/CVE-2019-9854" source="CVE"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* libreoffice: Insufficient URL validation allowing LibreLogo script execution (CVE-2019-9850)

* libreoffice: LibreLogo global-event script execution (CVE-2019-9851)

* libreoffice: Insufficient URL encoding flaw in allowed script location check (CVE-2019-9852)

* libreoffice: Insufficient URL decoding flaw in categorizing macro location (CVE-2019-9853)

* libreoffice: Unsafe URL assembly flaw in allowed script location check (CVE-2019-9854)

* libreoffice: Remote resources protection module not applied to bullet graphics (CVE-2019-9849)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-9849" impact="low" public="20190805">CVE-2019-9849</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-9850" impact="moderate" public="20190815">CVE-2019-9850</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2019-9851" impact="moderate" public="20190815">CVE-2019-9851</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-9852" impact="moderate" public="20190815">CVE-2019-9852</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-838" href="https://access.redhat.com/security/cve/CVE-2019-9853" impact="moderate" public="20190927">CVE-2019-9853</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-9854" impact="moderate" public="20190906">CVE-2019-9854</cve>
          <bugzilla href="https://bugzilla.redhat.com/1737421" id="1737421">CVE-2019-9849 libreoffice: Remote resources protection module not applied to bullet graphics</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744862" id="1744862">CVE-2019-9850 libreoffice: Insufficient URL validation allowing LibreLogo script execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744866" id="1744866">CVE-2019-9851 libreoffice: LibreLogo global-event script execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1744868" id="1744868">CVE-2019-9852 libreoffice: Insufficient URL encoding flaw in allowed script location check</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1769907" id="1769907">CVE-2019-9854 libreoffice: Unsafe URL assembly flaw in allowed script location check</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1797466" id="1797466">CVE-2019-9853 libreoffice: Insufficient URL decoding flaw in categorizing macro location</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="autocorr-af is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598001"/>
              <criterion comment="autocorr-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-bg is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598003"/>
              <criterion comment="autocorr-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ca is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598005"/>
              <criterion comment="autocorr-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-cs is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598007"/>
              <criterion comment="autocorr-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-da is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598009"/>
              <criterion comment="autocorr-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-de is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598011"/>
              <criterion comment="autocorr-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-en is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598013"/>
              <criterion comment="autocorr-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-es is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598015"/>
              <criterion comment="autocorr-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fa is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598017"/>
              <criterion comment="autocorr-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598019"/>
              <criterion comment="autocorr-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598021"/>
              <criterion comment="autocorr-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ga is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598023"/>
              <criterion comment="autocorr-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-hr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598025"/>
              <criterion comment="autocorr-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-hu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598027"/>
              <criterion comment="autocorr-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-is is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598029"/>
              <criterion comment="autocorr-is is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-it is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598031"/>
              <criterion comment="autocorr-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ja is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598033"/>
              <criterion comment="autocorr-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ko is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598035"/>
              <criterion comment="autocorr-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-lb is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598037"/>
              <criterion comment="autocorr-lb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-lt is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598039"/>
              <criterion comment="autocorr-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-mn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598041"/>
              <criterion comment="autocorr-mn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-nl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598043"/>
              <criterion comment="autocorr-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-pl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598045"/>
              <criterion comment="autocorr-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-pt is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598047"/>
              <criterion comment="autocorr-pt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ro is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598049"/>
              <criterion comment="autocorr-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ru is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598051"/>
              <criterion comment="autocorr-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598053"/>
              <criterion comment="autocorr-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598055"/>
              <criterion comment="autocorr-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598057"/>
              <criterion comment="autocorr-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sv is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598059"/>
              <criterion comment="autocorr-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-tr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598061"/>
              <criterion comment="autocorr-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-vi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598063"/>
              <criterion comment="autocorr-vi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-zh is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598065"/>
              <criterion comment="autocorr-zh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-base is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598067"/>
              <criterion comment="libreoffice-base is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-calc is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598069"/>
              <criterion comment="libreoffice-calc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-core is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598071"/>
              <criterion comment="libreoffice-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-data is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598073"/>
              <criterion comment="libreoffice-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-draw is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598075"/>
              <criterion comment="libreoffice-draw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-emailmerge is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598077"/>
              <criterion comment="libreoffice-emailmerge is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-filters is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598079"/>
              <criterion comment="libreoffice-filters is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-gdb-debug-support is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598081"/>
              <criterion comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-graphicfilter is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598083"/>
              <criterion comment="libreoffice-graphicfilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-gtk2 is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598085"/>
              <criterion comment="libreoffice-gtk2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-gtk3 is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598087"/>
              <criterion comment="libreoffice-gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ar is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598089"/>
              <criterion comment="libreoffice-help-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-bg is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598091"/>
              <criterion comment="libreoffice-help-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-bn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598093"/>
              <criterion comment="libreoffice-help-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ca is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598095"/>
              <criterion comment="libreoffice-help-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-cs is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598097"/>
              <criterion comment="libreoffice-help-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-da is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598099"/>
              <criterion comment="libreoffice-help-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-de is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598101"/>
              <criterion comment="libreoffice-help-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-dz is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598103"/>
              <criterion comment="libreoffice-help-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-el is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598105"/>
              <criterion comment="libreoffice-help-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-en is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598107"/>
              <criterion comment="libreoffice-help-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-es is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598109"/>
              <criterion comment="libreoffice-help-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-et is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598111"/>
              <criterion comment="libreoffice-help-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-eu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598113"/>
              <criterion comment="libreoffice-help-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-fi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598115"/>
              <criterion comment="libreoffice-help-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-fr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598117"/>
              <criterion comment="libreoffice-help-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-gl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598119"/>
              <criterion comment="libreoffice-help-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-gu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598121"/>
              <criterion comment="libreoffice-help-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-he is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598123"/>
              <criterion comment="libreoffice-help-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598125"/>
              <criterion comment="libreoffice-help-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598127"/>
              <criterion comment="libreoffice-help-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598129"/>
              <criterion comment="libreoffice-help-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-id is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598131"/>
              <criterion comment="libreoffice-help-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-it is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598133"/>
              <criterion comment="libreoffice-help-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ja is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598135"/>
              <criterion comment="libreoffice-help-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ko is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598137"/>
              <criterion comment="libreoffice-help-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-lt is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598139"/>
              <criterion comment="libreoffice-help-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-lv is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598141"/>
              <criterion comment="libreoffice-help-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nb is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598143"/>
              <criterion comment="libreoffice-help-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598145"/>
              <criterion comment="libreoffice-help-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598147"/>
              <criterion comment="libreoffice-help-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598149"/>
              <criterion comment="libreoffice-help-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pt-BR is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598151"/>
              <criterion comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pt-PT is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598153"/>
              <criterion comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ro is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598155"/>
              <criterion comment="libreoffice-help-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ru is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598157"/>
              <criterion comment="libreoffice-help-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-si is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598159"/>
              <criterion comment="libreoffice-help-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598161"/>
              <criterion comment="libreoffice-help-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598163"/>
              <criterion comment="libreoffice-help-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sv is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598165"/>
              <criterion comment="libreoffice-help-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ta is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598167"/>
              <criterion comment="libreoffice-help-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-tr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598169"/>
              <criterion comment="libreoffice-help-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-uk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598171"/>
              <criterion comment="libreoffice-help-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-zh-Hans is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598173"/>
              <criterion comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-zh-Hant is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598175"/>
              <criterion comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-impress is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598177"/>
              <criterion comment="libreoffice-impress is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-af is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598179"/>
              <criterion comment="libreoffice-langpack-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ar is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598181"/>
              <criterion comment="libreoffice-langpack-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-as is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598183"/>
              <criterion comment="libreoffice-langpack-as is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-bg is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598185"/>
              <criterion comment="libreoffice-langpack-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-bn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598187"/>
              <criterion comment="libreoffice-langpack-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-br is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598189"/>
              <criterion comment="libreoffice-langpack-br is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ca is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598191"/>
              <criterion comment="libreoffice-langpack-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-cs is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598193"/>
              <criterion comment="libreoffice-langpack-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-cy is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598195"/>
              <criterion comment="libreoffice-langpack-cy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-da is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598197"/>
              <criterion comment="libreoffice-langpack-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-de is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598199"/>
              <criterion comment="libreoffice-langpack-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-dz is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598201"/>
              <criterion comment="libreoffice-langpack-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-el is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598203"/>
              <criterion comment="libreoffice-langpack-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-en is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598205"/>
              <criterion comment="libreoffice-langpack-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-es is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598207"/>
              <criterion comment="libreoffice-langpack-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-et is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598209"/>
              <criterion comment="libreoffice-langpack-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-eu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598211"/>
              <criterion comment="libreoffice-langpack-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fa is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598213"/>
              <criterion comment="libreoffice-langpack-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598214"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598215"/>
              <criterion comment="libreoffice-langpack-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598216"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598217"/>
              <criterion comment="libreoffice-langpack-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598218"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ga is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598219"/>
              <criterion comment="libreoffice-langpack-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598220"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-gl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598221"/>
              <criterion comment="libreoffice-langpack-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-gu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598223"/>
              <criterion comment="libreoffice-langpack-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598224"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-he is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598225"/>
              <criterion comment="libreoffice-langpack-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598226"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hi is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598227"/>
              <criterion comment="libreoffice-langpack-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598228"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598229"/>
              <criterion comment="libreoffice-langpack-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598230"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598231"/>
              <criterion comment="libreoffice-langpack-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598232"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-id is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598233"/>
              <criterion comment="libreoffice-langpack-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598234"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-it is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598235"/>
              <criterion comment="libreoffice-langpack-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598236"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ja is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598237"/>
              <criterion comment="libreoffice-langpack-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598238"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-kk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598239"/>
              <criterion comment="libreoffice-langpack-kk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598240"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-kn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598241"/>
              <criterion comment="libreoffice-langpack-kn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ko is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598243"/>
              <criterion comment="libreoffice-langpack-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598244"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-lt is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598245"/>
              <criterion comment="libreoffice-langpack-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598246"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-lv is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598247"/>
              <criterion comment="libreoffice-langpack-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598248"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-mai is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598249"/>
              <criterion comment="libreoffice-langpack-mai is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598250"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ml is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598251"/>
              <criterion comment="libreoffice-langpack-ml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598252"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-mr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598253"/>
              <criterion comment="libreoffice-langpack-mr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598254"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nb is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598255"/>
              <criterion comment="libreoffice-langpack-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598256"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598257"/>
              <criterion comment="libreoffice-langpack-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598258"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598259"/>
              <criterion comment="libreoffice-langpack-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598260"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598261"/>
              <criterion comment="libreoffice-langpack-nr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nso is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598263"/>
              <criterion comment="libreoffice-langpack-nso is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598264"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-or is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598265"/>
              <criterion comment="libreoffice-langpack-or is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598266"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pa is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598267"/>
              <criterion comment="libreoffice-langpack-pa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598268"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598269"/>
              <criterion comment="libreoffice-langpack-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598270"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pt-BR is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598271"/>
              <criterion comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598272"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pt-PT is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598273"/>
              <criterion comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598274"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ro is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598275"/>
              <criterion comment="libreoffice-langpack-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598276"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ru is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598277"/>
              <criterion comment="libreoffice-langpack-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598278"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-si is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598279"/>
              <criterion comment="libreoffice-langpack-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598280"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598281"/>
              <criterion comment="libreoffice-langpack-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sl is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598283"/>
              <criterion comment="libreoffice-langpack-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598284"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598285"/>
              <criterion comment="libreoffice-langpack-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598286"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ss is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598287"/>
              <criterion comment="libreoffice-langpack-ss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598288"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-st is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598289"/>
              <criterion comment="libreoffice-langpack-st is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598290"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sv is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598291"/>
              <criterion comment="libreoffice-langpack-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598292"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ta is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598293"/>
              <criterion comment="libreoffice-langpack-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598294"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-te is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598295"/>
              <criterion comment="libreoffice-langpack-te is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598296"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-th is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598297"/>
              <criterion comment="libreoffice-langpack-th is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598298"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-tn is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598299"/>
              <criterion comment="libreoffice-langpack-tn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598300"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-tr is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598301"/>
              <criterion comment="libreoffice-langpack-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ts is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598303"/>
              <criterion comment="libreoffice-langpack-ts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598304"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-uk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598305"/>
              <criterion comment="libreoffice-langpack-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598306"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ve is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598307"/>
              <criterion comment="libreoffice-langpack-ve is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598308"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-xh is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598309"/>
              <criterion comment="libreoffice-langpack-xh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598310"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zh-Hans is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598311"/>
              <criterion comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598312"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zh-Hant is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598313"/>
              <criterion comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598314"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zu is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598315"/>
              <criterion comment="libreoffice-langpack-zu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598316"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-math is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598317"/>
              <criterion comment="libreoffice-math is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598318"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ogltrans is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598319"/>
              <criterion comment="libreoffice-ogltrans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598320"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-opensymbol-fonts is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598321"/>
              <criterion comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-pdfimport is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598323"/>
              <criterion comment="libreoffice-pdfimport is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598324"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-pyuno is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598325"/>
              <criterion comment="libreoffice-pyuno is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598326"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-sdk is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598327"/>
              <criterion comment="libreoffice-sdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598328"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-sdk-doc is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598329"/>
              <criterion comment="libreoffice-sdk-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598330"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ure is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598331"/>
              <criterion comment="libreoffice-ure is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598332"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ure-common is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598333"/>
              <criterion comment="libreoffice-ure-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598334"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-wiki-publisher is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598335"/>
              <criterion comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598336"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-writer is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598337"/>
              <criterion comment="libreoffice-writer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598338"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-x11 is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598339"/>
              <criterion comment="libreoffice-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598340"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-xsltfilter is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598341"/>
              <criterion comment="libreoffice-xsltfilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreofficekit is earlier than 1:6.0.6.1-20.el8" test_ref="oval:org.almalinux.alsa:tst:20201598343"/>
              <criterion comment="libreofficekit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598344"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201600" version="636">
      <metadata>
        <title>ALSA-2020:1600: evolution security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1600" ref_url="https://errata.almalinux.org/8/ALSA-2020-1600.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1600" ref_url="https://access.redhat.com/errata/RHSA-2020:1600" source="RHSA"/>
        <reference ref_id="CVE-2018-15587" ref_url="https://access.redhat.com/security/cve/CVE-2018-15587" source="CVE"/>
        <description>Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.

The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.

Security Fix(es):

* evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages (CVE-2018-15587)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="(CWE-290|CWE-347)" href="https://access.redhat.com/security/cve/CVE-2018-15587" impact="moderate" public="20180527">CVE-2018-15587</cve>
          <bugzilla href="https://bugzilla.redhat.com/1677650" id="1677650">CVE-2018-15587 evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="evolution-ews is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20201600001"/>
              <criterion comment="evolution-ews is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-ews-langpacks is earlier than 0:3.28.5-9.el8" test_ref="oval:org.almalinux.alsa:tst:20201600003"/>
              <criterion comment="evolution-ews-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600005"/>
              <criterion comment="evolution is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-bogofilter is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600007"/>
              <criterion comment="evolution-bogofilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-devel is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600009"/>
              <criterion comment="evolution-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-help is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600011"/>
              <criterion comment="evolution-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-langpacks is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600013"/>
              <criterion comment="evolution-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-pst is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600015"/>
              <criterion comment="evolution-pst is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-spamassassin is earlier than 0:3.28.5-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201600017"/>
              <criterion comment="evolution-spamassassin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600019"/>
              <criterion comment="evolution-data-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-devel is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600021"/>
              <criterion comment="evolution-data-server-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-doc is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600023"/>
              <criterion comment="evolution-data-server-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-langpacks is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600025"/>
              <criterion comment="evolution-data-server-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-perl is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600027"/>
              <criterion comment="evolution-data-server-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-tests is earlier than 0:3.28.5-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201600029"/>
              <criterion comment="evolution-data-server-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201604" version="638">
      <metadata>
        <title>ALSA-2020:1604: tcpdump security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1604" ref_url="https://errata.almalinux.org/8/ALSA-2020-1604.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1604" ref_url="https://access.redhat.com/errata/RHSA-2020:1604" source="RHSA"/>
        <reference ref_id="CVE-2018-19519" ref_url="https://access.redhat.com/security/cve/CVE-2018-19519" source="CVE"/>
        <description>The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces.

Security Fix(es):

* tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap (CVE-2018-19519)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19519" impact="low" public="20181203">CVE-2018-19519</cve>
          <bugzilla href="https://bugzilla.redhat.com/1655374" id="1655374">CVE-2018-19519 tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="tcpdump is earlier than 14:4.9.2-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201604001"/>
          <criterion comment="tcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201604002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201605" version="637">
      <metadata>
        <title>ALSA-2020:1605: python27:2.7 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1605" ref_url="https://errata.almalinux.org/8/ALSA-2020-1605.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1605" ref_url="https://access.redhat.com/errata/RHSA-2020:1605" source="RHSA"/>
        <reference ref_id="CVE-2018-18074" ref_url="https://access.redhat.com/security/cve/CVE-2018-18074" source="CVE"/>
        <reference ref_id="CVE-2018-20060" ref_url="https://access.redhat.com/security/cve/CVE-2018-20060" source="CVE"/>
        <reference ref_id="CVE-2018-20852" ref_url="https://access.redhat.com/security/cve/CVE-2018-20852" source="CVE"/>
        <reference ref_id="CVE-2019-11236" ref_url="https://access.redhat.com/security/cve/CVE-2019-11236" source="CVE"/>
        <reference ref_id="CVE-2019-11324" ref_url="https://access.redhat.com/security/cve/CVE-2019-11324" source="CVE"/>
        <reference ref_id="CVE-2019-16056" ref_url="https://access.redhat.com/security/cve/CVE-2019-16056" source="CVE"/>
        <reference ref_id="CVE-2019-16935" ref_url="https://access.redhat.com/security/cve/CVE-2019-16935" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.

The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944)

Security Fix(es):

* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)

* python: Cookie domain check returns incorrect results (CVE-2018-20852)

* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)

* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)

* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2018-18074" impact="low" public="20180629">CVE-2018-18074</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2018-20060" impact="moderate" public="20180326">CVE-2018-20060</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-20852" impact="moderate" public="20181031">CVE-2018-20852</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-11236" impact="moderate" public="20190313">CVE-2019-11236</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-11324" impact="moderate" public="20190417">CVE-2019-11324</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16056" impact="moderate" public="20180719">CVE-2019-16056</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-16935" impact="moderate" public="20190921">CVE-2019-16935</cve>
          <bugzilla href="https://bugzilla.redhat.com/1643829" id="1643829">CVE-2018-18074 python-requests: Redirect from HTTPS to HTTP does not remove Authorization header</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1649153" id="1649153">CVE-2018-20060 python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700824" id="1700824">CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702473" id="1702473">CVE-2019-11324 python-urllib3: Certification mishandle when error should be thrown</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1740347" id="1740347">CVE-2018-20852 python: Cookie domain check returns incorrect results</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749839" id="1749839">CVE-2019-16056 python: email.utils.parseaddr wrongly parses email addresses</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763229" id="1763229">CVE-2019-16935 python: XSS vulnerability in the documentation XML-RPC server in server_title field</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python27:2.7 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190981119"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350011"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350012"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350013"/>
              <criterion comment="babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810022"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350031"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350032"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350033"/>
              <criterion comment="python-nose-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350051"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350052"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350053"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933350071"/>
              <criterion comment="python-sqlalchemy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2 is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050091"/>
              <criterion comment="python2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350111"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350112"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350131"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350132"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350151"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350152"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350171"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350172"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350173"/>
              <criterion comment="python2-babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350191"/>
              <criterion comment="python2-backports is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350192"/>
              <criterion comment="python2-backports is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350211"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350212"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350231"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350232"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350233"/>
              <criterion comment="python2-bson is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350251"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350252"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350271"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350272"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-debug is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050291"/>
              <criterion comment="python2-debug is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-devel is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050311"/>
              <criterion comment="python2-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350331"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350332"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350351"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350352"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350371"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350372"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350391"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350392"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350411"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350412"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350431"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350432"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350451"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350452"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350471"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350472"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350473"/>
              <criterion comment="python2-jinja2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810482"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-libs is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050491"/>
              <criterion comment="python2-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810502"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350511"/>
              <criterion comment="python2-lxml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350512"/>
              <criterion comment="python2-lxml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350531"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350532"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350551"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350552"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350571"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350572"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350573"/>
              <criterion comment="python2-nose is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810582"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350591"/>
              <criterion comment="python2-numpy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350592"/>
              <criterion comment="python2-numpy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810602"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350611"/>
              <criterion comment="python2-numpy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981062"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350612"/>
              <criterion comment="python2-numpy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350631"/>
              <criterion comment="python2-numpy-f2py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350632"/>
              <criterion comment="python2-numpy-f2py is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810642"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip is earlier than 0:9.0.3-16.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050651"/>
              <criterion comment="python2-pip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810662"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip-wheel is earlier than 0:9.0.3-16.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016050671"/>
              <criterion comment="python2-pip-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933350682"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350691"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350692"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350711"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350712"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350713"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350731"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350732"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350733"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350751"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350752"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350753"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350771"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350772"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350791"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350792"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350793"/>
              <criterion comment="python2-pygments is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810782"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350811"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350812"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350813"/>
              <criterion comment="python2-pymongo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810802"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350831"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350832"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350833"/>
              <criterion comment="python2-pymongo-gridfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810822"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350851"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350852"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350871"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350872"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350891"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350892"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350911"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350912"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350931"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350932"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-3.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202016050951"/>
              <criterion comment="python2-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981094"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-3.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202016050952"/>
              <criterion comment="python2-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981094"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350971"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350972"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350991"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350992"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350993"/>
              <criterion comment="python2-scipy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810982"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools is earlier than 0:39.0.1-11.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351011"/>
              <criterion comment="python2-setuptools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811002"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools-wheel is earlier than 0:39.0.1-11.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351031"/>
              <criterion comment="python2-setuptools-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933351051"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933351052"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351071"/>
              <criterion comment="python2-six is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981104"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351072"/>
              <criterion comment="python2-six is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-sqlalchemy is earlier than 0:1.3.2-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:201933351091"/>
              <criterion comment="python2-sqlalchemy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-test is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016051111"/>
              <criterion comment="python2-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tkinter is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016051131"/>
              <criterion comment="python2-tkinter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tools is earlier than 0:2.7.17-1.module_el8.2.0+381+9a5b3c3b" test_ref="oval:org.almalinux.alsa:tst:202016051151"/>
              <criterion comment="python2-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351171"/>
              <criterion comment="python2-urllib3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981114"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351172"/>
              <criterion comment="python2-urllib3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351191"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351192"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351193"/>
              <criterion comment="python2-virtualenv is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811162"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351211"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351212"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351213"/>
              <criterion comment="python2-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351231"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351232"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351233"/>
              <criterion comment="python2-wheel-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351242"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201616" version="635">
      <metadata>
        <title>ALSA-2020:1616: irssi security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1616" ref_url="https://errata.almalinux.org/8/ALSA-2020-1616.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1616" ref_url="https://access.redhat.com/errata/RHSA-2020:1616" source="RHSA"/>
        <reference ref_id="CVE-2019-13045" ref_url="https://access.redhat.com/security/cve/CVE-2019-13045" source="CVE"/>
        <description>Irssi is a modular IRC client with Perl scripting. 

Security Fix(es):

* irssi: use after free when sending SASL login to server (CVE-2019-13045)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-13045" impact="low" public="20190629">CVE-2019-13045</cve>
          <bugzilla href="https://bugzilla.redhat.com/1727683" id="1727683">CVE-2019-13045 irssi: use after free when sending SASL login to server</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="irssi is earlier than 0:1.1.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201616001"/>
              <criterion comment="irssi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201616002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="irssi-devel is earlier than 0:1.1.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201616003"/>
              <criterion comment="irssi-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201616004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201624" version="636">
      <metadata>
        <title>ALSA-2020:1624: php:7.2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1624" ref_url="https://errata.almalinux.org/8/ALSA-2020-1624.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1624" ref_url="https://access.redhat.com/errata/RHSA-2020:1624" source="RHSA"/>
        <reference ref_id="CVE-2018-20783" ref_url="https://access.redhat.com/security/cve/CVE-2018-20783" source="CVE"/>
        <reference ref_id="CVE-2019-11034" ref_url="https://access.redhat.com/security/cve/CVE-2019-11034" source="CVE"/>
        <reference ref_id="CVE-2019-11035" ref_url="https://access.redhat.com/security/cve/CVE-2019-11035" source="CVE"/>
        <reference ref_id="CVE-2019-11036" ref_url="https://access.redhat.com/security/cve/CVE-2019-11036" source="CVE"/>
        <reference ref_id="CVE-2019-11039" ref_url="https://access.redhat.com/security/cve/CVE-2019-11039" source="CVE"/>
        <reference ref_id="CVE-2019-11040" ref_url="https://access.redhat.com/security/cve/CVE-2019-11040" source="CVE"/>
        <reference ref_id="CVE-2019-11041" ref_url="https://access.redhat.com/security/cve/CVE-2019-11041" source="CVE"/>
        <reference ref_id="CVE-2019-11042" ref_url="https://access.redhat.com/security/cve/CVE-2019-11042" source="CVE"/>
        <reference ref_id="CVE-2019-9020" ref_url="https://access.redhat.com/security/cve/CVE-2019-9020" source="CVE"/>
        <reference ref_id="CVE-2019-9021" ref_url="https://access.redhat.com/security/cve/CVE-2019-9021" source="CVE"/>
        <reference ref_id="CVE-2019-9022" ref_url="https://access.redhat.com/security/cve/CVE-2019-9022" source="CVE"/>
        <reference ref_id="CVE-2019-9023" ref_url="https://access.redhat.com/security/cve/CVE-2019-9023" source="CVE"/>
        <reference ref_id="CVE-2019-9024" ref_url="https://access.redhat.com/security/cve/CVE-2019-9024" source="CVE"/>
        <reference ref_id="CVE-2019-9637" ref_url="https://access.redhat.com/security/cve/CVE-2019-9637" source="CVE"/>
        <reference ref_id="CVE-2019-9638" ref_url="https://access.redhat.com/security/cve/CVE-2019-9638" source="CVE"/>
        <reference ref_id="CVE-2019-9639" ref_url="https://access.redhat.com/security/cve/CVE-2019-9639" source="CVE"/>
        <reference ref_id="CVE-2019-9640" ref_url="https://access.redhat.com/security/cve/CVE-2019-9640" source="CVE"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981)

Security Fix(es):

* php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020)

* php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637)

* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638)

* php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639)

* php: Invalid read in exif_process_SOFn() (CVE-2019-9640)

* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)

* php: Buffer over-read in exif_read_data() (CVE-2019-11040)

* php: Buffer over-read in PHAR reading functions (CVE-2018-20783)

* php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021)

* php: memcpy with negative length via crafted DNS response (CVE-2019-9022)

* php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023)

* php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024)

* php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034)

* php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035)

* php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036)

* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)

* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2018-20783" impact="low" public="20181112">CVE-2018-20783</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11034" impact="low" public="20190316">CVE-2019-11034</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11035" impact="low" public="20190402">CVE-2019-11035</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-11036" impact="low" public="20190502">CVE-2019-11036</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-190-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11039" impact="moderate" public="20190618">CVE-2019-11039</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11040" impact="moderate" public="20190618">CVE-2019-11040</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11041" impact="low" public="20190809">CVE-2019-11041</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11042" impact="low" public="20190809">CVE-2019-11042</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9020" impact="moderate" public="20181205">CVE-2019-9020</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9021" impact="low" public="20181206">CVE-2019-9021</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-9022" impact="low" public="20181229">CVE-2019-9022</cve>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-9023" impact="low" public="20181229">CVE-2019-9023</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-9024" impact="low" public="20190222">CVE-2019-9024</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-266" href="https://access.redhat.com/security/cve/CVE-2019-9637" impact="moderate" public="20190218">CVE-2019-9637</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-665" href="https://access.redhat.com/security/cve/CVE-2019-9638" impact="moderate" public="20190204">CVE-2019-9638</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-665" href="https://access.redhat.com/security/cve/CVE-2019-9639" impact="moderate" public="20190223">CVE-2019-9639</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-9640" impact="moderate" public="20190129">CVE-2019-9640</cve>
          <bugzilla href="https://bugzilla.redhat.com/1680545" id="1680545">CVE-2018-20783 php: Buffer over-read in PHAR reading functions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685123" id="1685123">CVE-2019-9020 php: Invalid memory access in function xmlrpc_decode()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685132" id="1685132">CVE-2019-9021 php: Heap-based buffer over-read in PHAR reading functions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685398" id="1685398">CVE-2019-9023 php: Heap-based buffer over-read in mbstring regular expression functions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685404" id="1685404">CVE-2019-9024 php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1685412" id="1685412">CVE-2019-9022 php: memcpy with negative length via crafted DNS response</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688897" id="1688897">CVE-2019-9637 php: File rename across filesystems may allow unwanted access during processing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688922" id="1688922">CVE-2019-9638 php: Uninitialized read in exif_process_IFD_in_MAKERNOTE</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688934" id="1688934">CVE-2019-9639 php: Uninitialized read in exif_process_IFD_in_MAKERNOTE</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1688939" id="1688939">CVE-2019-9640 php: Invalid read in exif_process_SOFn()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702246" id="1702246">CVE-2019-11035 php: Heap buffer overflow in function exif_iif_add_value()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702256" id="1702256">CVE-2019-11034 php: Heap buffer overflow in function exif_process_IFD_TAG()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1707299" id="1707299">CVE-2019-11036 php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724152" id="1724152">CVE-2019-11039 php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724154" id="1724154">CVE-2019-11040 php: Buffer over-read in exif_read_data()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1739459" id="1739459">CVE-2019-11041 php: Heap buffer over-read in exif_scan_thumbnail()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1739465" id="1739465">CVE-2019-11042 php: Heap buffer over-read in exif_process_user_comment()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module php:7.2 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193735071"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350011"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350012"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350013"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350031"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350032"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350033"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350051"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350052"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350053"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350071"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350072"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.1-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350073"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240091"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240092"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240093"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240111"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240112"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240113"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240131"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240132"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240133"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240151"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240152"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240153"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240171"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240172"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240173"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240191"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240192"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240193"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240211"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240212"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240213"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240231"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240232"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240233"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240251"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240252"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240253"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240271"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240272"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240273"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240291"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240292"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240293"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240311"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240312"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240313"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240331"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240332"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240333"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240351"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240352"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240353"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240371"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240372"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240373"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240391"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240392"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240393"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240411"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240412"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240413"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240431"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240432"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240433"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240451"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240452"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240453"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240471"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240472"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240473"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350491"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350492"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.5-9.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350493"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350511"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350512"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350513"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350531"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350532"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.12-2.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350533"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350551"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:201937350552"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.3-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:201937350553"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240571"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240572"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240573"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240591"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240592"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240593"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240611"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240612"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240613"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240631"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240632"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240633"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240651"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240652"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240653"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240671"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240672"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240673"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.2.24-1.module_el8.3.0+2010+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240691"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.2.24-1.module_el8.4.0+2228+7c76a223" test_ref="oval:org.almalinux.alsa:tst:202016240692"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.2.24-1.module_el8.5.0+53+9945c2af" test_ref="oval:org.almalinux.alsa:tst:202016240693"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201631" version="639">
      <metadata>
        <title>ALSA-2020:1631: GStreamer, libmad, and SDL security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1631" ref_url="https://errata.almalinux.org/8/ALSA-2020-1631.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1631" ref_url="https://access.redhat.com/errata/RHSA-2020:1631" source="RHSA"/>
        <reference ref_id="CVE-2018-7263" ref_url="https://access.redhat.com/security/cve/CVE-2018-7263" source="CVE"/>
        <description>The GStreamer library provides a streaming media framework based on graphs of media data filters.

The libmad package is an MPEG audio decoder capable of 24-bit output. 

Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.

Security Fix(es):

* libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2018-7263" impact="low" public="20180220">CVE-2018-7263</cve>
          <bugzilla href="https://bugzilla.redhat.com/1547504" id="1547504">CVE-2018-7263 libmad: Double-free in the mad_decoder_run() function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="orc is earlier than 0:0.4.28-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201631001"/>
              <criterion comment="orc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="orc-compiler is earlier than 0:0.4.28-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201631003"/>
              <criterion comment="orc-compiler is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="orc-devel is earlier than 0:0.4.28-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201631005"/>
              <criterion comment="orc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-bad-free is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631007"/>
              <criterion comment="gstreamer1-plugins-bad-free is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-bad-free-devel is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631009"/>
              <criterion comment="gstreamer1-plugins-bad-free-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-base is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631011"/>
              <criterion comment="gstreamer1-plugins-base is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-base-devel is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631013"/>
              <criterion comment="gstreamer1-plugins-base-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-good is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631015"/>
              <criterion comment="gstreamer1-plugins-good is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-good-gtk is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631017"/>
              <criterion comment="gstreamer1-plugins-good-gtk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-plugins-ugly-free is earlier than 0:1.16.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201631019"/>
              <criterion comment="gstreamer1-plugins-ugly-free is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1 is earlier than 0:1.16.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201631021"/>
              <criterion comment="gstreamer1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gstreamer1-devel is earlier than 0:1.16.1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201631023"/>
              <criterion comment="gstreamer1-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL is earlier than 0:1.2.15-37.el8" test_ref="oval:org.almalinux.alsa:tst:20201631025"/>
              <criterion comment="SDL is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL-devel is earlier than 0:1.2.15-37.el8" test_ref="oval:org.almalinux.alsa:tst:20201631027"/>
              <criterion comment="SDL-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL2 is earlier than 0:2.0.10-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201631029"/>
              <criterion comment="SDL2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL2-devel is earlier than 0:2.0.10-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201631031"/>
              <criterion comment="SDL2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL2-static is earlier than 0:2.0.10-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201631033"/>
              <criterion comment="SDL2-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libmad is earlier than 0:0.15.1b-25.el8" test_ref="oval:org.almalinux.alsa:tst:20201631035"/>
              <criterion comment="libmad is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libmad-devel is earlier than 0:0.15.1b-25.el8" test_ref="oval:org.almalinux.alsa:tst:20201631037"/>
              <criterion comment="libmad-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201631038"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201635" version="638">
      <metadata>
        <title>ALSA-2020:1635: gdb security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1635" ref_url="https://errata.almalinux.org/8/ALSA-2020-1635.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1635" ref_url="https://access.redhat.com/errata/RHSA-2020:1635" source="RHSA"/>
        <reference ref_id="CVE-2019-1010180" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010180" source="CVE"/>
        <description>The GNU Debugger (GDB) allows users to debug programs written in various programming languages including C, C++, and Fortran. 

Security Fix(es):

* gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution (CVE-2019-1010180)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-1010180" impact="moderate" public="20190813">CVE-2019-1010180</cve>
          <bugzilla href="https://bugzilla.redhat.com/1740615" id="1740615">CVE-2019-1010180 gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gdb is earlier than 0:8.2-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201635001"/>
              <criterion comment="gdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-doc is earlier than 0:8.2-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201635003"/>
              <criterion comment="gdb-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-gdbserver is earlier than 0:8.2-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201635005"/>
              <criterion comment="gdb-gdbserver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdb-headless is earlier than 0:8.2-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201635007"/>
              <criterion comment="gdb-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193352008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201636" version="637">
      <metadata>
        <title>ALSA-2020:1636: libsndfile security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1636" ref_url="https://errata.almalinux.org/8/ALSA-2020-1636.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1636" ref_url="https://access.redhat.com/errata/RHSA-2020:1636" source="RHSA"/>
        <reference ref_id="CVE-2018-13139" ref_url="https://access.redhat.com/security/cve/CVE-2018-13139" source="CVE"/>
        <reference ref_id="CVE-2018-19662" ref_url="https://access.redhat.com/security/cve/CVE-2018-19662" source="CVE"/>
        <description>libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. 

Security Fix(es):

* libsndfile: stack-based buffer overflow in sndfile-deinterleave utility (CVE-2018-13139)

* libsndfile: buffer over-read in the function i2alaw_array in alaw.c (CVE-2018-19662)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-13139" impact="moderate" public="20180703">CVE-2018-13139</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-19662" impact="low" public="20181127">CVE-2018-19662</cve>
          <bugzilla href="https://bugzilla.redhat.com/1598480" id="1598480">CVE-2018-13139 libsndfile: stack-based buffer overflow in sndfile-deinterleave utility</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1659631" id="1659631">CVE-2018-19662 libsndfile: buffer over-read in the function i2alaw_array in alaw.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libsndfile is earlier than 0:1.0.28-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201636001"/>
              <criterion comment="libsndfile is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201636002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsndfile-devel is earlier than 0:1.0.28-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201636003"/>
              <criterion comment="libsndfile-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201636004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201644" version="640">
      <metadata>
        <title>ALSA-2020:1644: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1644" ref_url="https://errata.almalinux.org/8/ALSA-2020-1644.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1644" ref_url="https://access.redhat.com/errata/RHSA-2020:1644" source="RHSA"/>
        <reference ref_id="CVE-2019-14540" ref_url="https://access.redhat.com/security/cve/CVE-2019-14540" source="CVE"/>
        <reference ref_id="CVE-2019-16335" ref_url="https://access.redhat.com/security/cve/CVE-2019-16335" source="CVE"/>
        <reference ref_id="CVE-2019-16942" ref_url="https://access.redhat.com/security/cve/CVE-2019-16942" source="CVE"/>
        <reference ref_id="CVE-2019-16943" ref_url="https://access.redhat.com/security/cve/CVE-2019-16943" source="CVE"/>
        <reference ref_id="CVE-2019-17531" ref_url="https://access.redhat.com/security/cve/CVE-2019-17531" source="CVE"/>
        <reference ref_id="CVE-2019-20330" ref_url="https://access.redhat.com/security/cve/CVE-2019-20330" source="CVE"/>
        <reference ref_id="CVE-2020-10672" ref_url="https://access.redhat.com/security/cve/CVE-2020-10672" source="CVE"/>
        <reference ref_id="CVE-2020-10673" ref_url="https://access.redhat.com/security/cve/CVE-2020-10673" source="CVE"/>
        <reference ref_id="CVE-2020-8840" ref_url="https://access.redhat.com/security/cve/CVE-2020-8840" source="CVE"/>
        <reference ref_id="CVE-2020-9546" ref_url="https://access.redhat.com/security/cve/CVE-2020-9546" source="CVE"/>
        <reference ref_id="CVE-2020-9547" ref_url="https://access.redhat.com/security/cve/CVE-2020-9547" source="CVE"/>
        <reference ref_id="CVE-2020-9548" ref_url="https://access.redhat.com/security/cve/CVE-2020-9548" source="CVE"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required AlmaLinux Certificate System.

Security Fix(es):

* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)

* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)

* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)

* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)

* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-14540" impact="moderate" public="20190915">CVE-2019-14540</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-16335" impact="moderate" public="20190915">CVE-2019-16335</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-16942" impact="moderate" public="20190927">CVE-2019-16942</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-502-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-16943" impact="moderate" public="20190927">CVE-2019-16943</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-17531" impact="important" public="20191012">CVE-2019-17531</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2019-20330" impact="moderate" public="20200102">CVE-2019-20330</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-96" href="https://access.redhat.com/security/cve/CVE-2020-10672" impact="moderate" public="20200315">CVE-2020-10672</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-96" href="https://access.redhat.com/security/cve/CVE-2020-10673" impact="moderate" public="20200318">CVE-2020-10673</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-8840" impact="moderate" public="20200302">CVE-2020-8840</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-9546" impact="moderate" public="20200302">CVE-2020-9546</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-9547" impact="moderate" public="20200302">CVE-2020-9547</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-9548" impact="moderate" public="20200302">CVE-2020-9548</cve>
          <bugzilla href="https://bugzilla.redhat.com/1755831" id="1755831">CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1755849" id="1755849">CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758187" id="1758187">CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758191" id="1758191">CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775293" id="1775293">CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793154" id="1793154">CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1815470" id="1815470">CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1815495" id="1815495">CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816330" id="1816330">CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816332" id="1816332">CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816337" id="1816337">CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816340" id="1816340">CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module pki-deps:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416067"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160011"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160012"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160031"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160032"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160051"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160052"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160071"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160072"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160091"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160092"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160111"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160112"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160131"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160132"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160151"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160152"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-annotations is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440171"/>
                  <criterion comment="jackson-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416018"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-annotations is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440172"/>
                  <criterion comment="jackson-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416018"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-core is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440191"/>
                  <criterion comment="jackson-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416020"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-core is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440192"/>
                  <criterion comment="jackson-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416020"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-databind is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440211"/>
                  <criterion comment="jackson-databind is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416022"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-databind is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440212"/>
                  <criterion comment="jackson-databind is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160231"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160232"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160251"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160252"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160271"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160272"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160291"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160292"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160311"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160312"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160331"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160332"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.7-16.module_el8.2.0+315+896aef55" test_ref="oval:org.almalinux.alba:tst:201934160351"/>
                  <criterion comment="pki-servlet-4.0-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160362"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-engine is earlier than 1:9.0.7-16.module_el8.2.0+315+896aef55" test_ref="oval:org.almalinux.alba:tst:201934160371"/>
                  <criterion comment="pki-servlet-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160391"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160392"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160411"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160412"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160431"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160432"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alba:tst:201934160451"/>
                  <criterion comment="resteasy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416046"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+454+67dccca4" test_ref="oval:org.almalinux.alba:tst:201934160452"/>
                  <criterion comment="resteasy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160462"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160471"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160472"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160491"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160492"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160511"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160512"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160531"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160532"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160551"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160552"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160571"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160572"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160591"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160592"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160611"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160612"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160631"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160632"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160651"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160652"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module pki-core:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416094"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="jss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416069"/>
                  <criterion comment="jss is earlier than 0:4.6.2-4.module+el8.2.0+6123+b4678599" test_ref="oval:org.almalinux.alsa:tst:20201644068"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jss-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416071"/>
                  <criterion comment="jss-javadoc is earlier than 0:4.6.2-4.module+el8.2.0+6123+b4678599" test_ref="oval:org.almalinux.alsa:tst:20201644070"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk is earlier than 0:4.21.0-2.module_el8.2.0+371+f5726439" test_ref="oval:org.almalinux.alsa:tst:202016440721"/>
                  <criterion comment="ldapjdk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160732"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk-javadoc is earlier than 0:4.21.0-2.module_el8.2.0+371+f5726439" test_ref="oval:org.almalinux.alsa:tst:202016440741"/>
                  <criterion comment="ldapjdk-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160752"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416077"/>
                  <criterion comment="pki-base is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644076"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416079"/>
                  <criterion comment="pki-base-java is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-ca is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416081"/>
                  <criterion comment="pki-ca is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-kra is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416083"/>
                  <criterion comment="pki-kra is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416085"/>
                  <criterion comment="pki-server is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-symkey is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416087"/>
                  <criterion comment="pki-symkey is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644086"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416089"/>
                  <criterion comment="pki-tools is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pki is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416091"/>
                  <criterion comment="python3-pki is earlier than 0:10.8.3-1.module+el8.2.0+5925+bad5981a" test_ref="oval:org.almalinux.alsa:tst:20201644090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="tomcatjss is earlier than 0:7.4.1-2.module_el8.2.0+371+f5726439" test_ref="oval:org.almalinux.alsa:tst:202016440921"/>
                  <criterion comment="tomcatjss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160932"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201650" version="645">
      <metadata>
        <title>ALSA-2020:1650: container-tools:rhel8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1650" ref_url="https://errata.almalinux.org/8/ALSA-2020-1650.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1650" ref_url="https://access.redhat.com/errata/RHSA-2020:1650" source="RHSA"/>
        <reference ref_id="CVE-2019-19921" ref_url="https://access.redhat.com/security/cve/CVE-2019-19921" source="CVE"/>
        <reference ref_id="CVE-2020-1702" ref_url="https://access.redhat.com/security/cve/CVE-2020-1702" source="CVE"/>
        <reference ref_id="CVE-2020-1726" ref_url="https://access.redhat.com/security/cve/CVE-2020-1726" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921)

* containers/image: Container images read entire image manifest into memory (CVE-2020-1702)

* podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-41" href="https://access.redhat.com/security/cve/CVE-2019-19921" impact="moderate" public="20191221">CVE-2019-19921</cve>
          <cve cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-1702" impact="low" public="20200120">CVE-2020-1702</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-552" href="https://access.redhat.com/security/cve/CVE-2020-1726" impact="low" public="20200211">CVE-2020-1726</cve>
          <bugzilla href="https://bugzilla.redhat.com/1792796" id="1792796">CVE-2020-1702 containers/image: Container images read entire image manifest into memory</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796107" id="1796107">CVE-2019-19921 runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801152" id="1801152">CVE-2020-1726 podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-7.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-7.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500031"/>
              <criterion comment="buildah-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:12-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500051"/>
              <criterion comment="cockpit-podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.6-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500071"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500091"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-5.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500111"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:0.1.40-10.module+el8.2.0+5955+6cd70ceb" test_ref="oval:org.almalinux.alsa:tst:20201650013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500151"/>
              <criterion comment="crit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500171"/>
              <criterion comment="criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.2-5.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500191"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.6.4-10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500211"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.6.4-10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500231"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:1.6.4-10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500251"/>
              <criterion comment="podman-remote is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:1.6.4-10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500271"/>
              <criterion comment="podman-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202016500291"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202016500292"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500311"/>
              <criterion comment="python3-criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-65.rc10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500331"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:0.1.40-10.module+el8.2.0+5955+6cd70ceb" test_ref="oval:org.almalinux.alsa:tst:20201650035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
              <criterion comment="skopeo-tests is earlier than 1:0.1.40-10.module+el8.2.0+5955+6cd70ceb" test_ref="oval:org.almalinux.alsa:tst:20201650037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500391"/>
              <criterion comment="slirp4netns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500411"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202016500431"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201653" version="635">
      <metadata>
        <title>ALSA-2020:1653: zziplib security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1653" ref_url="https://errata.almalinux.org/8/ALSA-2020-1653.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1653" ref_url="https://access.redhat.com/errata/RHSA-2020:1653" source="RHSA"/>
        <reference ref_id="CVE-2018-17828" ref_url="https://access.redhat.com/security/cve/CVE-2018-17828" source="CVE"/>
        <description>The zziplib is a lightweight library to easily extract data from zip files.

Security Fix(es):

* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2018-17828" impact="moderate" public="20180925">CVE-2018-17828</cve>
          <bugzilla href="https://bugzilla.redhat.com/1635888" id="1635888">CVE-2018-17828 zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="zziplib is earlier than 0:0.13.68-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201653001"/>
              <criterion comment="zziplib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201653002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="zziplib-devel is earlier than 0:0.13.68-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201653003"/>
              <criterion comment="zziplib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201653004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="zziplib-utils is earlier than 0:0.13.68-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201653005"/>
              <criterion comment="zziplib-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201653006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201659" version="637">
      <metadata>
        <title>ALSA-2020:1659: grafana security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1659" ref_url="https://errata.almalinux.org/8/ALSA-2020-1659.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1659" ref_url="https://access.redhat.com/errata/RHSA-2020:1659" source="RHSA"/>
        <reference ref_id="CVE-2019-15043" ref_url="https://access.redhat.com/security/cve/CVE-2019-15043" source="CVE"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB. 

The following packages have been upgraded to a later upstream version: grafana (6.3.6). (BZ#1725278)

Security Fix(es):

* grafana: incorrect access control in snapshot HTTP API leads to denial of service (CVE-2019-15043)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="(CWE-284|CWE-200)" href="https://access.redhat.com/security/cve/CVE-2019-15043" impact="moderate" public="20190829:1800">CVE-2019-15043</cve>
          <bugzilla href="https://bugzilla.redhat.com/1746945" id="1746945">CVE-2019-15043 grafana: incorrect access control in snapshot HTTP API leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="grafana is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659001"/>
              <criterion comment="grafana is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-azure-monitor is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659003"/>
              <criterion comment="grafana-azure-monitor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-cloudwatch is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659005"/>
              <criterion comment="grafana-cloudwatch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-elasticsearch is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659007"/>
              <criterion comment="grafana-elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-graphite is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659009"/>
              <criterion comment="grafana-graphite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-influxdb is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659011"/>
              <criterion comment="grafana-influxdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-loki is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659013"/>
              <criterion comment="grafana-loki is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mssql is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659015"/>
              <criterion comment="grafana-mssql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mysql is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659017"/>
              <criterion comment="grafana-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-opentsdb is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659019"/>
              <criterion comment="grafana-opentsdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-postgres is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659021"/>
              <criterion comment="grafana-postgres is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-prometheus is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659023"/>
              <criterion comment="grafana-prometheus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-stackdriver is earlier than 0:6.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201659025"/>
              <criterion comment="grafana-stackdriver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659026"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201660" version="636">
      <metadata>
        <title>ALSA-2020:1660: mod_auth_mellon security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1660" ref_url="https://errata.almalinux.org/8/ALSA-2020-1660.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1660" ref_url="https://access.redhat.com/errata/RHSA-2020:1660" source="RHSA"/>
        <reference ref_id="CVE-2019-13038" ref_url="https://access.redhat.com/security/cve/CVE-2019-13038" source="CVE"/>
        <description>The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server.

Security Fix(es):

* mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theft (CVE-2019-13038)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2019-13038" impact="moderate" public="20190620">CVE-2019-13038</cve>
          <bugzilla href="https://bugzilla.redhat.com/1725740" id="1725740">CVE-2019-13038 mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theft</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mod_auth_mellon is earlier than 0:0.14.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201660001"/>
              <criterion comment="mod_auth_mellon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190985002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_auth_mellon-diagnostics is earlier than 0:0.14.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201660003"/>
              <criterion comment="mod_auth_mellon-diagnostics is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193421004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201665" version="637">
      <metadata>
        <title>ALSA-2020:1665: qt5 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1665" ref_url="https://errata.almalinux.org/8/ALSA-2020-1665.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1665" ref_url="https://access.redhat.com/errata/RHSA-2020:1665" source="RHSA"/>
        <reference ref_id="CVE-2018-19869" ref_url="https://access.redhat.com/security/cve/CVE-2018-19869" source="CVE"/>
        <reference ref_id="CVE-2018-19871" ref_url="https://access.redhat.com/security/cve/CVE-2018-19871" source="CVE"/>
        <reference ref_id="CVE-2018-19872" ref_url="https://access.redhat.com/security/cve/CVE-2018-19872" source="CVE"/>
        <reference ref_id="CVE-2019-18281" ref_url="https://access.redhat.com/security/cve/CVE-2019-18281" source="CVE"/>
        <description>Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt.

The following packages have been upgraded to a later upstream version: qt5 (5.12.5), qt5-qt3d (5.12.5), qt5-qtbase (5.12.5), qt5-qtcanvas3d (5.12.5), qt5-qtconnectivity (5.12.5), qt5-qtdeclarative (5.12.5), qt5-qtdoc (5.12.5), qt5-qtgraphicaleffects (5.12.5), qt5-qtimageformats (5.12.5), qt5-qtlocation (5.12.5), qt5-qtmultimedia (5.12.5), qt5-qtquickcontrols (5.12.5), qt5-qtquickcontrols2 (5.12.5), qt5-qtscript (5.12.5), qt5-qtsensors (5.12.5), qt5-qtserialbus (5.12.5), qt5-qtserialport (5.12.5), qt5-qtsvg (5.12.5), qt5-qttools (5.12.5), qt5-qttranslations (5.12.5), qt5-qtwayland (5.12.5), qt5-qtwebchannel (5.12.5), qt5-qtwebsockets (5.12.5), qt5-qtx11extras (5.12.5), qt5-qtxmlpatterns (5.12.5), python-qt5 (5.13.1), sip (4.19.19). (BZ#1775603, BZ#1775604)

Security Fix(es):

* qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp (CVE-2018-19872)

* qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service (CVE-2018-19869)

* qt5-qtimageformats: QTgaFile CPU exhaustion (CVE-2018-19871)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-29"/>
          <updated date="2020-04-29"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-19869" impact="low" public="20180730">CVE-2018-19869</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-19871" impact="low" public="20180824">CVE-2018-19871</cve>
          <cve cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2018-19872" impact="moderate" public="20181204">CVE-2018-19872</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-18281" impact="low" public="20191023">CVE-2019-18281</cve>
          <bugzilla href="https://bugzilla.redhat.com/1661460" id="1661460">CVE-2018-19869 qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1661465" id="1661465">CVE-2018-19871 qt5-qtimageformats: QTgaFile CPU exhaustion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1691636" id="1691636">CVE-2018-19872 qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764742" id="1764742">CVE-2019-18281 qt5-qtbase: Out-of-bounds access in generateDirectionalRuns() function in qtextengine.cpp</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python-qt5-rpm-macros is earlier than 0:5.13.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665001"/>
              <criterion comment="python-qt5-rpm-macros is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qt5 is earlier than 0:5.13.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665003"/>
              <criterion comment="python3-qt5 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qt5-base is earlier than 0:5.13.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665005"/>
              <criterion comment="python3-qt5-base is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-qt5-devel is earlier than 0:5.13.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665007"/>
              <criterion comment="python3-qt5-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qgnomeplatform is earlier than 0:0.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201665009"/>
              <criterion comment="qgnomeplatform is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-devel is earlier than 0:5.12.5-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201665011"/>
              <criterion comment="qt5-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-rpm-macros is earlier than 0:5.12.5-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201665013"/>
              <criterion comment="qt5-rpm-macros is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-srpm-macros is earlier than 0:5.12.5-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201665015"/>
              <criterion comment="qt5-srpm-macros is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qt3d is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201665017"/>
              <criterion comment="qt5-qt3d is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qt3d-devel is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201665019"/>
              <criterion comment="qt5-qt3d-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qt3d-examples is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201665021"/>
              <criterion comment="qt5-qt3d-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtcanvas3d is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665023"/>
              <criterion comment="qt5-qtcanvas3d is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtcanvas3d-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665025"/>
              <criterion comment="qt5-qtcanvas3d-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtconnectivity is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665027"/>
              <criterion comment="qt5-qtconnectivity is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtconnectivity-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665029"/>
              <criterion comment="qt5-qtconnectivity-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtconnectivity-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665031"/>
              <criterion comment="qt5-qtconnectivity-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtdeclarative is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665033"/>
              <criterion comment="qt5-qtdeclarative is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtdeclarative-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665035"/>
              <criterion comment="qt5-qtdeclarative-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtdeclarative-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665037"/>
              <criterion comment="qt5-qtdeclarative-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtdeclarative-static is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665039"/>
              <criterion comment="qt5-qtdeclarative-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtdoc is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665041"/>
              <criterion comment="qt5-qtdoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtgraphicaleffects is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665043"/>
              <criterion comment="qt5-qtgraphicaleffects is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtimageformats is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665045"/>
              <criterion comment="qt5-qtimageformats is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtlocation is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665047"/>
              <criterion comment="qt5-qtlocation is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtlocation-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665049"/>
              <criterion comment="qt5-qtlocation-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtlocation-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665051"/>
              <criterion comment="qt5-qtlocation-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtmultimedia is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665053"/>
              <criterion comment="qt5-qtmultimedia is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtmultimedia-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665055"/>
              <criterion comment="qt5-qtmultimedia-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtmultimedia-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665057"/>
              <criterion comment="qt5-qtmultimedia-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtquickcontrols is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665059"/>
              <criterion comment="qt5-qtquickcontrols is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtquickcontrols-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665061"/>
              <criterion comment="qt5-qtquickcontrols-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtquickcontrols2 is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665063"/>
              <criterion comment="qt5-qtquickcontrols2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtquickcontrols2-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665065"/>
              <criterion comment="qt5-qtquickcontrols2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtquickcontrols2-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665067"/>
              <criterion comment="qt5-qtquickcontrols2-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtscript is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665069"/>
              <criterion comment="qt5-qtscript is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtscript-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665071"/>
              <criterion comment="qt5-qtscript-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtscript-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665073"/>
              <criterion comment="qt5-qtscript-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsensors is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665075"/>
              <criterion comment="qt5-qtsensors is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsensors-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665077"/>
              <criterion comment="qt5-qtsensors-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsensors-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665079"/>
              <criterion comment="qt5-qtsensors-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtserialbus is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665081"/>
              <criterion comment="qt5-qtserialbus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtserialbus-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665083"/>
              <criterion comment="qt5-qtserialbus-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtserialport is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665085"/>
              <criterion comment="qt5-qtserialport is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtserialport-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665087"/>
              <criterion comment="qt5-qtserialport-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtserialport-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665089"/>
              <criterion comment="qt5-qtserialport-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsvg is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665091"/>
              <criterion comment="qt5-qtsvg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsvg-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665093"/>
              <criterion comment="qt5-qtsvg-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtsvg-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665095"/>
              <criterion comment="qt5-qtsvg-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-assistant is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665097"/>
              <criterion comment="qt5-assistant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-designer is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665099"/>
              <criterion comment="qt5-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-doctools is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665101"/>
              <criterion comment="qt5-doctools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-linguist is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665103"/>
              <criterion comment="qt5-linguist is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qdbusviewer is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665105"/>
              <criterion comment="qt5-qdbusviewer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665107"/>
              <criterion comment="qt5-qttools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-common is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665109"/>
              <criterion comment="qt5-qttools-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665111"/>
              <criterion comment="qt5-qttools-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665113"/>
              <criterion comment="qt5-qttools-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designer is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665115"/>
              <criterion comment="qt5-qttools-libs-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designercomponents is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665117"/>
              <criterion comment="qt5-qttools-libs-designercomponents is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-help is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665119"/>
              <criterion comment="qt5-qttools-libs-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-static is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665121"/>
              <criterion comment="qt5-qttools-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttranslations is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665123"/>
              <criterion comment="qt5-qttranslations is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwayland is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665125"/>
              <criterion comment="qt5-qtwayland is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwayland-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665127"/>
              <criterion comment="qt5-qtwayland-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwayland-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665129"/>
              <criterion comment="qt5-qtwayland-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebchannel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665131"/>
              <criterion comment="qt5-qtwebchannel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebchannel-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665133"/>
              <criterion comment="qt5-qtwebchannel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebchannel-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665135"/>
              <criterion comment="qt5-qtwebchannel-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665137"/>
              <criterion comment="qt5-qtwebsockets is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665139"/>
              <criterion comment="qt5-qtwebsockets-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665141"/>
              <criterion comment="qt5-qtwebsockets-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtx11extras is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665143"/>
              <criterion comment="qt5-qtx11extras is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtx11extras-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665145"/>
              <criterion comment="qt5-qtx11extras-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtxmlpatterns is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665147"/>
              <criterion comment="qt5-qtxmlpatterns is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtxmlpatterns-devel is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665149"/>
              <criterion comment="qt5-qtxmlpatterns-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtxmlpatterns-examples is earlier than 0:5.12.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665151"/>
              <criterion comment="qt5-qtxmlpatterns-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pyqt5-sip is earlier than 0:4.19.19-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665153"/>
              <criterion comment="python3-pyqt5-sip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-sip-devel is earlier than 0:4.19.19-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665155"/>
              <criterion comment="python3-sip-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sip is earlier than 0:4.19.19-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201665157"/>
              <criterion comment="sip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665159"/>
              <criterion comment="qt5-qtbase is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-common is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665161"/>
              <criterion comment="qt5-qtbase-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-devel is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665163"/>
              <criterion comment="qt5-qtbase-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-examples is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665165"/>
              <criterion comment="qt5-qtbase-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-gui is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665167"/>
              <criterion comment="qt5-qtbase-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-mysql is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665169"/>
              <criterion comment="qt5-qtbase-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-odbc is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665171"/>
              <criterion comment="qt5-qtbase-odbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-postgresql is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665173"/>
              <criterion comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-private-devel is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665175"/>
              <criterion comment="qt5-qtbase-private-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-static is earlier than 0:5.12.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201665177"/>
              <criterion comment="qt5-qtbase-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201672" version="636">
      <metadata>
        <title>ALSA-2020:1672: freeradius:3.0 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1672" ref_url="https://errata.almalinux.org/8/ALSA-2020-1672.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1672" ref_url="https://access.redhat.com/errata/RHSA-2020:1672" source="RHSA"/>
        <reference ref_id="CVE-2019-13456" ref_url="https://access.redhat.com/security/cve/CVE-2019-13456" source="CVE"/>
        <description>FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-13456" impact="moderate" public="20190803">CVE-2019-13456</cve>
          <bugzilla href="https://bugzilla.redhat.com/1737663" id="1737663">CVE-2019-13456 freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module freeradius:3.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191142025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720011"/>
              <criterion comment="freeradius is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720031"/>
              <criterion comment="freeradius-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720051"/>
              <criterion comment="freeradius-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720071"/>
              <criterion comment="freeradius-krb5 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720091"/>
              <criterion comment="freeradius-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720111"/>
              <criterion comment="freeradius-mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720131"/>
              <criterion comment="freeradius-perl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720151"/>
              <criterion comment="freeradius-postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720171"/>
              <criterion comment="freeradius-rest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720191"/>
              <criterion comment="freeradius-sqlite is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720211"/>
              <criterion comment="freeradius-unixODBC is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.17-7.module_el8.2.0+321+f9fd5d26" test_ref="oval:org.almalinux.alsa:tst:202016720231"/>
              <criterion comment="freeradius-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420242"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201686" version="635">
      <metadata>
        <title>ALSA-2020:1686: libmspack security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1686" ref_url="https://errata.almalinux.org/8/ALSA-2020-1686.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1686" ref_url="https://access.redhat.com/errata/RHSA-2020:1686" source="RHSA"/>
        <reference ref_id="CVE-2019-1010305" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010305" source="CVE"/>
        <description>The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.

Security Fix(es):

* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-1010305" impact="low" public="20190715">CVE-2019-1010305</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730568" id="1730568">CVE-2019-1010305 libmspack: buffer overflow in function chmd_read_headers()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libmspack is earlier than 0:0.7-0.3.alpha.el8.4" test_ref="oval:org.almalinux.alsa:tst:20201686001"/>
              <criterion comment="libmspack is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201686002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libmspack-devel is earlier than 0:0.7-0.3.alpha.el8.4" test_ref="oval:org.almalinux.alsa:tst:20201686003"/>
              <criterion comment="libmspack-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201686004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201688" version="637">
      <metadata>
        <title>ALSA-2020:1688: libtiff security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1688" ref_url="https://errata.almalinux.org/8/ALSA-2020-1688.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1688" ref_url="https://access.redhat.com/errata/RHSA-2020:1688" source="RHSA"/>
        <reference ref_id="CVE-2019-14973" ref_url="https://access.redhat.com/security/cve/CVE-2019-14973" source="CVE"/>
        <description>The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

* libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c (CVE-2019-14973)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-14973" impact="moderate" public="20190814">CVE-2019-14973</cve>
          <bugzilla href="https://bugzilla.redhat.com/1745951" id="1745951">CVE-2019-14973 libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libtiff is earlier than 0:4.0.9-17.el8" test_ref="oval:org.almalinux.alsa:tst:20201688001"/>
              <criterion comment="libtiff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-devel is earlier than 0:4.0.9-17.el8" test_ref="oval:org.almalinux.alsa:tst:20201688003"/>
              <criterion comment="libtiff-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-tools is earlier than 0:4.0.9-17.el8" test_ref="oval:org.almalinux.alsa:tst:20201688005"/>
              <criterion comment="libtiff-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201702" version="636">
      <metadata>
        <title>ALSA-2020:1702: rsyslog security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1702" ref_url="https://errata.almalinux.org/8/ALSA-2020-1702.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1702" ref_url="https://access.redhat.com/errata/RHSA-2020:1702" source="RHSA"/>
        <reference ref_id="CVE-2019-17041" ref_url="https://access.redhat.com/security/cve/CVE-2019-17041" source="CVE"/>
        <reference ref_id="CVE-2019-17042" ref_url="https://access.redhat.com/security/cve/CVE-2019-17042" source="CVE"/>
        <description>The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format.

The following packages have been upgraded to a later upstream version: rsyslog (8.1911.0). (BZ#1740683)

Security Fix(es):

* rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c (CVE-2019-17041)

* rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c (CVE-2019-17042)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-17041" impact="moderate" public="20190930">CVE-2019-17041</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-17042" impact="moderate" public="20191001">CVE-2019-17042</cve>
          <bugzilla href="https://bugzilla.redhat.com/1766693" id="1766693">CVE-2019-17041 rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1766700" id="1766700">CVE-2019-17042 rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="rsyslog is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702001"/>
              <criterion comment="rsyslog is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-crypto is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702003"/>
              <criterion comment="rsyslog-crypto is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-doc is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702005"/>
              <criterion comment="rsyslog-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-elasticsearch is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702007"/>
              <criterion comment="rsyslog-elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-gnutls is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702009"/>
              <criterion comment="rsyslog-gnutls is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-gssapi is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702011"/>
              <criterion comment="rsyslog-gssapi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-kafka is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702013"/>
              <criterion comment="rsyslog-kafka is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mmaudit is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702015"/>
              <criterion comment="rsyslog-mmaudit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mmjsonparse is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702017"/>
              <criterion comment="rsyslog-mmjsonparse is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mmkubernetes is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702019"/>
              <criterion comment="rsyslog-mmkubernetes is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mmnormalize is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702021"/>
              <criterion comment="rsyslog-mmnormalize is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mmsnmptrapd is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702023"/>
              <criterion comment="rsyslog-mmsnmptrapd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-mysql is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702025"/>
              <criterion comment="rsyslog-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-pgsql is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702027"/>
              <criterion comment="rsyslog-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-relp is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702029"/>
              <criterion comment="rsyslog-relp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="rsyslog-snmp is earlier than 0:8.1911.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201702031"/>
              <criterion comment="rsyslog-snmp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201702032"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201708" version="636">
      <metadata>
        <title>ALSA-2020:1708: liblouis security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1708" ref_url="https://errata.almalinux.org/8/ALSA-2020-1708.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1708" ref_url="https://access.redhat.com/errata/RHSA-2020:1708" source="RHSA"/>
        <reference ref_id="CVE-2018-11577" ref_url="https://access.redhat.com/security/cve/CVE-2018-11577" source="CVE"/>
        <reference ref_id="CVE-2018-11684" ref_url="https://access.redhat.com/security/cve/CVE-2018-11684" source="CVE"/>
        <reference ref_id="CVE-2018-11685" ref_url="https://access.redhat.com/security/cve/CVE-2018-11685" source="CVE"/>
        <reference ref_id="CVE-2018-12085" ref_url="https://access.redhat.com/security/cve/CVE-2018-12085" source="CVE"/>
        <description>Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).

Security Fix(es):

* liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684)

* liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685)

* liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577)

* liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-11577" impact="low" public="20180530">CVE-2018-11577</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-11684" impact="moderate" public="20180606">CVE-2018-11684</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-11685" impact="moderate" public="20180606">CVE-2018-11685</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-12085" impact="low" public="20180605">CVE-2018-12085</cve>
          <bugzilla href="https://bugzilla.redhat.com/1585905" id="1585905">CVE-2018-11577 liblouis: Segmentation fault in logging.c:lou_logPrint()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1588631" id="1588631">CVE-2018-11684 liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1588636" id="1588636">CVE-2018-11685 liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1589940" id="1589940">CVE-2018-12085 liblouis: Stack-based buffer overflow in compileTranslationTable.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="liblouis is earlier than 0:2.6.2-21.el8" test_ref="oval:org.almalinux.alsa:tst:20201708001"/>
              <criterion comment="liblouis is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201708002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-louis is earlier than 0:2.6.2-21.el8" test_ref="oval:org.almalinux.alsa:tst:20201708003"/>
              <criterion comment="python3-louis is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201708004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201712" version="638">
      <metadata>
        <title>ALSA-2020:1712: edk2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1712" ref_url="https://errata.almalinux.org/8/ALSA-2020-1712.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1712" ref_url="https://access.redhat.com/errata/RHSA-2020:1712" source="RHSA"/>
        <reference ref_id="CVE-2019-14563" ref_url="https://access.redhat.com/security/cve/CVE-2019-14563" source="CVE"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* edk2: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib (CVE-2019-14563)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-14563" impact="moderate" public="20200205">CVE-2019-14563</cve>
          <bugzilla href="https://bugzilla.redhat.com/1758620" id="1758620">CVE-2019-14563 edk2: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="edk2-aarch64 is earlier than 0:20190829git37eef91017ad-9.el8" test_ref="oval:org.almalinux.alsa:tst:20201712001"/>
              <criterion comment="edk2-aarch64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="edk2-ovmf is earlier than 0:20190829git37eef91017ad-9.el8" test_ref="oval:org.almalinux.alsa:tst:20201712003"/>
              <criterion comment="edk2-ovmf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201715" version="638">
      <metadata>
        <title>ALSA-2020:1715: dnsmasq security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1715" ref_url="https://errata.almalinux.org/8/ALSA-2020-1715.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1715" ref_url="https://access.redhat.com/errata/RHSA-2020:1715" source="RHSA"/>
        <reference ref_id="CVE-2019-14834" ref_url="https://access.redhat.com/security/cve/CVE-2019-14834" source="CVE"/>
        <description>The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: memory leak in the create_helper() function in /src/helper.c (CVE-2019-14834)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2019-14834" impact="low" public="20191023">CVE-2019-14834</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764425" id="1764425">CVE-2019-14834 dnsmasq: memory leak in the create_helper() function in /src/helper.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dnsmasq is earlier than 0:2.79-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201715001"/>
              <criterion comment="dnsmasq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201715002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnsmasq-utils is earlier than 0:2.79-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201715003"/>
              <criterion comment="dnsmasq-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201715004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201716" version="635">
      <metadata>
        <title>ALSA-2020:1716: unbound security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1716" ref_url="https://errata.almalinux.org/8/ALSA-2020-1716.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1716" ref_url="https://access.redhat.com/errata/RHSA-2020:1716" source="RHSA"/>
        <reference ref_id="CVE-2019-18934" ref_url="https://access.redhat.com/security/cve/CVE-2019-18934" source="CVE"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. 

Security Fix(es):

* unbound: command injection with data coming from a specially crafted IPSECKEY answer (CVE-2019-18934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2019-18934" impact="moderate" public="20191126">CVE-2019-18934</cve>
          <bugzilla href="https://bugzilla.redhat.com/1776762" id="1776762">CVE-2019-18934 unbound: command injection with data coming from a specially crafted IPSECKEY answer</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python3-unbound is earlier than 0:1.7.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201716001"/>
              <criterion comment="python3-unbound is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound is earlier than 0:1.7.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201716003"/>
              <criterion comment="unbound is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound-devel is earlier than 0:1.7.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201716005"/>
              <criterion comment="unbound-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound-libs is earlier than 0:1.7.3-10.el8" test_ref="oval:org.almalinux.alsa:tst:20201716007"/>
              <criterion comment="unbound-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201725" version="642">
      <metadata>
        <title>ALSA-2020:1725: haproxy security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1725" ref_url="https://errata.almalinux.org/8/ALSA-2020-1725.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1725" ref_url="https://access.redhat.com/errata/RHSA-2020:1725" source="RHSA"/>
        <reference ref_id="CVE-2019-18277" ref_url="https://access.redhat.com/security/cve/CVE-2019-18277" source="CVE"/>
        <reference ref_id="CVE-2019-19330" ref_url="https://access.redhat.com/security/cve/CVE-2019-19330" source="CVE"/>
        <description>The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.

The following packages have been upgraded to a later upstream version: haproxy (1.8.23). (BZ#1774745)

Security Fix(es):

* haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value (CVE-2019-18277)

* haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks (CVE-2019-19330)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-18277" impact="moderate" public="20190913">CVE-2019-18277</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-19330" impact="moderate" public="20191125">CVE-2019-19330</cve>
          <bugzilla href="https://bugzilla.redhat.com/1759697" id="1759697">CVE-2019-18277 haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777584" id="1777584">CVE-2019-19330 haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="haproxy is earlier than 0:1.8.23-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201725001"/>
          <criterion comment="haproxy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201288002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201735" version="635">
      <metadata>
        <title>ALSA-2020:1735: dpdk security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1735" ref_url="https://errata.almalinux.org/8/ALSA-2020-1735.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1735" ref_url="https://access.redhat.com/errata/RHSA-2020:1735" source="RHSA"/>
        <reference ref_id="CVE-2019-14818" ref_url="https://access.redhat.com/security/cve/CVE-2019-14818" source="CVE"/>
        <description>The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.

The following packages have been upgraded to a later upstream version: dpdk (19.11). (BZ#1773889)

Security Fix(es):

* dpdk: possible memory leak leads to denial of service (CVE-2019-14818)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-14818" impact="moderate" public="20191112:1500">CVE-2019-14818</cve>
          <bugzilla href="https://bugzilla.redhat.com/1737327" id="1737327">CVE-2019-14818 dpdk: possible memory leak leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dpdk is earlier than 0:19.11-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201735001"/>
              <criterion comment="dpdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-devel is earlier than 0:19.11-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201735003"/>
              <criterion comment="dpdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-doc is earlier than 0:19.11-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201735005"/>
              <criterion comment="dpdk-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-tools is earlier than 0:19.11-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201735007"/>
              <criterion comment="dpdk-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201764" version="638">
      <metadata>
        <title>ALSA-2020:1764: python3 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1764" ref_url="https://errata.almalinux.org/8/ALSA-2020-1764.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1764" ref_url="https://access.redhat.com/errata/RHSA-2020:1764" source="RHSA"/>
        <reference ref_id="CVE-2018-20852" ref_url="https://access.redhat.com/security/cve/CVE-2018-20852" source="CVE"/>
        <reference ref_id="CVE-2019-16056" ref_url="https://access.redhat.com/security/cve/CVE-2019-16056" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 

Security Fix(es):

* python: Cookie domain check returns incorrect results (CVE-2018-20852)

* python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-20852" impact="moderate" public="20181031">CVE-2018-20852</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-16056" impact="moderate" public="20180719">CVE-2019-16056</cve>
          <bugzilla href="https://bugzilla.redhat.com/1740347" id="1740347">CVE-2018-20852 python: Cookie domain check returns incorrect results</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749839" id="1749839">CVE-2019-16056 python: email.utils.parseaddr wrongly parses email addresses</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764001"/>
              <criterion comment="platform-python is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-debug is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764003"/>
              <criterion comment="platform-python-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-devel is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764005"/>
              <criterion comment="platform-python-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-idle is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764007"/>
              <criterion comment="python3-idle is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libs is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764009"/>
              <criterion comment="python3-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-test is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764011"/>
              <criterion comment="python3-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-tkinter is earlier than 0:3.6.8-23.el8" test_ref="oval:org.almalinux.alsa:tst:20201764013"/>
              <criterion comment="python3-tkinter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201765" version="638">
      <metadata>
        <title>ALSA-2020:1765: cups security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1765" ref_url="https://errata.almalinux.org/8/ALSA-2020-1765.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1765" ref_url="https://access.redhat.com/errata/RHSA-2020:1765" source="RHSA"/>
        <reference ref_id="CVE-2019-8675" ref_url="https://access.redhat.com/security/cve/CVE-2019-8675" source="CVE"/>
        <reference ref_id="CVE-2019-8696" ref_url="https://access.redhat.com/security/cve/CVE-2019-8696" source="CVE"/>
        <description>The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.

Security Fix(es):

* cups: stack-buffer-overflow in libcups's asn1_get_type function (CVE-2019-8675)

* cups: stack-buffer-overflow in libcups's asn1_get_packed function (CVE-2019-8696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-8675" impact="low" public="20190814:1700">CVE-2019-8675</cve>
          <cve cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-8696" impact="low" public="20190814:1700">CVE-2019-8696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1738455" id="1738455">CVE-2019-8675 cups: stack-buffer-overflow in libcups's asn1_get_type function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1738497" id="1738497">CVE-2019-8696 cups: stack-buffer-overflow in libcups's asn1_get_packed function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cups is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765001"/>
              <criterion comment="cups is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-client is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765003"/>
              <criterion comment="cups-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-devel is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765005"/>
              <criterion comment="cups-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-filesystem is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765007"/>
              <criterion comment="cups-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-ipptool is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765009"/>
              <criterion comment="cups-ipptool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-libs is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765011"/>
              <criterion comment="cups-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-lpd is earlier than 1:2.2.6-33.el8" test_ref="oval:org.almalinux.alsa:tst:20201765013"/>
              <criterion comment="cups-lpd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201766" version="639">
      <metadata>
        <title>ALSA-2020:1766: GNOME security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1766" ref_url="https://errata.almalinux.org/8/ALSA-2020-1766.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1766" ref_url="https://access.redhat.com/errata/RHSA-2020:1766" source="RHSA"/>
        <reference ref_id="CVE-2018-20337" ref_url="https://access.redhat.com/security/cve/CVE-2018-20337" source="CVE"/>
        <reference ref_id="CVE-2019-12447" ref_url="https://access.redhat.com/security/cve/CVE-2019-12447" source="CVE"/>
        <reference ref_id="CVE-2019-12448" ref_url="https://access.redhat.com/security/cve/CVE-2019-12448" source="CVE"/>
        <reference ref_id="CVE-2019-12449" ref_url="https://access.redhat.com/security/cve/CVE-2019-12449" source="CVE"/>
        <reference ref_id="CVE-2019-3825" ref_url="https://access.redhat.com/security/cve/CVE-2019-3825" source="CVE"/>
        <description>GNOME is the default desktop environment of AlmaLinux Enterprise Linux.

Security Fix(es):

* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)

* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)

* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)

* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)

* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2018-20337" impact="moderate" public="20181218">CVE-2018-20337</cve>
          <cve cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-282" href="https://access.redhat.com/security/cve/CVE-2019-12447" impact="moderate" public="20190529">CVE-2019-12447</cve>
          <cve cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-364" href="https://access.redhat.com/security/cve/CVE-2019-12448" impact="moderate" public="20190529">CVE-2019-12448</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-282" href="https://access.redhat.com/security/cve/CVE-2019-12449" impact="moderate" public="20190529">CVE-2019-12449</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2019-3825" impact="moderate" public="20190206">CVE-2019-3825</cve>
          <bugzilla href="https://bugzilla.redhat.com/1661555" id="1661555">CVE-2018-20337 LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1672825" id="1672825">CVE-2019-3825 gdm: lock screen bypass when timed login is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728562" id="1728562">CVE-2019-12447 gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728564" id="1728564">CVE-2019-12448 gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728567" id="1728567">CVE-2019-12449 gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gvfs is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766001"/>
              <criterion comment="gvfs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afc is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766003"/>
              <criterion comment="gvfs-afc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afp is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766005"/>
              <criterion comment="gvfs-afp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-archive is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766007"/>
              <criterion comment="gvfs-archive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-client is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766009"/>
              <criterion comment="gvfs-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-devel is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766011"/>
              <criterion comment="gvfs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-fuse is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766013"/>
              <criterion comment="gvfs-fuse is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-goa is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766015"/>
              <criterion comment="gvfs-goa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-gphoto2 is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766017"/>
              <criterion comment="gvfs-gphoto2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-mtp is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766019"/>
              <criterion comment="gvfs-mtp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-smb is earlier than 0:1.36.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766021"/>
              <criterion comment="gvfs-smb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="baobab is earlier than 0:3.28.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766023"/>
              <criterion comment="baobab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="LibRaw is earlier than 0:0.19.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766025"/>
              <criterion comment="LibRaw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="LibRaw-devel is earlier than 0:0.19.5-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766027"/>
              <criterion comment="LibRaw-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince is earlier than 0:3.28.4-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766029"/>
              <criterion comment="evince is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-browser-plugin is earlier than 0:3.28.4-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766031"/>
              <criterion comment="evince-browser-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-libs is earlier than 0:3.28.4-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766033"/>
              <criterion comment="evince-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evince-nautilus is earlier than 0:3.28.4-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766035"/>
              <criterion comment="evince-nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-online-accounts is earlier than 0:3.28.2-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766037"/>
              <criterion comment="gnome-online-accounts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-online-accounts-devel is earlier than 0:3.28.2-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766039"/>
              <criterion comment="gnome-online-accounts-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk-update-icon-cache is earlier than 0:3.22.30-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201766041"/>
              <criterion comment="gtk-update-icon-cache is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3 is earlier than 0:3.22.30-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201766043"/>
              <criterion comment="gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-devel is earlier than 0:3.22.30-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201766045"/>
              <criterion comment="gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-immodule-xim is earlier than 0:3.22.30-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201766047"/>
              <criterion comment="gtk3-immodule-xim is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas is earlier than 0:3.32.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766049"/>
              <criterion comment="gsettings-desktop-schemas is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas-devel is earlier than 0:3.32.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766051"/>
              <criterion comment="gsettings-desktop-schemas-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session is earlier than 0:3.28.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766053"/>
              <criterion comment="gnome-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session-wayland-session is earlier than 0:3.28.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766055"/>
              <criterion comment="gnome-session-wayland-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session-xsession is earlier than 0:3.28.1-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766057"/>
              <criterion comment="gnome-session-xsession is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-settings-daemon is earlier than 0:3.32.0-9.el8" test_ref="oval:org.almalinux.alsa:tst:20201766059"/>
              <criterion comment="gnome-settings-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-remote-desktop is earlier than 0:0.1.6-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766061"/>
              <criterion comment="gnome-remote-desktop is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="appstream-data is earlier than 0:8-20191129.el8" test_ref="oval:org.almalinux.alsa:tst:20201766063"/>
              <criterion comment="appstream-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-menus is earlier than 0:3.13.3-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201766065"/>
              <criterion comment="gnome-menus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-menus-devel is earlier than 0:3.13.3-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201766067"/>
              <criterion comment="gnome-menus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus is earlier than 0:3.28.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201766069"/>
              <criterion comment="nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-devel is earlier than 0:3.28.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201766071"/>
              <criterion comment="nautilus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-extensions is earlier than 0:3.28.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201766073"/>
              <criterion comment="nautilus-extensions is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-terminal is earlier than 0:3.28.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766075"/>
              <criterion comment="gnome-terminal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-terminal-nautilus is earlier than 0:3.28.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766077"/>
              <criterion comment="gnome-terminal-nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice is earlier than 0:0.6.50-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766079"/>
              <criterion comment="accountsservice is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice-devel is earlier than 0:0.6.50-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766081"/>
              <criterion comment="accountsservice-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="accountsservice-libs is earlier than 0:0.6.50-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766083"/>
              <criterion comment="accountsservice-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libxslt is earlier than 0:1.1.32-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766085"/>
              <criterion comment="libxslt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libxslt-devel is earlier than 0:1.1.32-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766087"/>
              <criterion comment="libxslt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vinagre is earlier than 0:3.22.0-21.el8" test_ref="oval:org.almalinux.alsa:tst:20201766089"/>
              <criterion comment="vinagre is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-boxes is earlier than 0:3.28.5-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766091"/>
              <criterion comment="gnome-boxes is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193387008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-software is earlier than 0:3.30.6-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201766093"/>
              <criterion comment="gnome-software is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-software-editor is earlier than 0:3.30.6-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201766095"/>
              <criterion comment="gnome-software-editor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdm is earlier than 1:3.28.3-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201766097"/>
              <criterion comment="gdm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs52 is earlier than 0:52.9.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201766099"/>
              <criterion comment="mozjs52 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs52-devel is earlier than 0:52.9.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20201766101"/>
              <criterion comment="mozjs52-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vala is earlier than 0:0.40.19-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766103"/>
              <criterion comment="vala is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vala-devel is earlier than 0:0.40.19-1.el8" test_ref="oval:org.almalinux.alsa:tst:20201766105"/>
              <criterion comment="vala-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs60 is earlier than 0:60.9.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766107"/>
              <criterion comment="mozjs60 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mozjs60-devel is earlier than 0:60.9.0-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766109"/>
              <criterion comment="mozjs60-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gjs is earlier than 0:1.56.2-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766111"/>
              <criterion comment="gjs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gjs-devel is earlier than 0:1.56.2-4.el8" test_ref="oval:org.almalinux.alsa:tst:20201766113"/>
              <criterion comment="gjs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-tweaks is earlier than 0:3.28.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20201766115"/>
              <criterion comment="gnome-tweaks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="clutter is earlier than 0:1.26.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766117"/>
              <criterion comment="clutter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="clutter-devel is earlier than 0:1.26.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766119"/>
              <criterion comment="clutter-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="clutter-doc is earlier than 0:1.26.2-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201766121"/>
              <criterion comment="clutter-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center is earlier than 0:3.28.2-19.el8" test_ref="oval:org.almalinux.alsa:tst:20201766123"/>
              <criterion comment="gnome-control-center is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center-filesystem is earlier than 0:3.28.2-19.el8" test_ref="oval:org.almalinux.alsa:tst:20201766125"/>
              <criterion comment="gnome-control-center-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell is earlier than 0:3.32.2-14.el8" test_ref="oval:org.almalinux.alsa:tst:20201766127"/>
              <criterion comment="gnome-shell is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter is earlier than 0:3.32.2-34.el8" test_ref="oval:org.almalinux.alsa:tst:20201766129"/>
              <criterion comment="mutter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter-devel is earlier than 0:3.32.2-34.el8" test_ref="oval:org.almalinux.alsa:tst:20201766131"/>
              <criterion comment="mutter-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvncserver is earlier than 0:0.9.11-14.el8" test_ref="oval:org.almalinux.alsa:tst:20201766133"/>
              <criterion comment="libvncserver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvncserver-devel is earlier than 0:0.9.11-14.el8" test_ref="oval:org.almalinux.alsa:tst:20201766135"/>
              <criterion comment="libvncserver-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201769" version="640">
      <metadata>
        <title>ALSA-2020:1769: kernel security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1769" ref_url="https://errata.almalinux.org/8/ALSA-2020-1769.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1769" ref_url="https://access.redhat.com/errata/RHSA-2020:1769" source="RHSA"/>
        <reference ref_id="CVE-2018-16871" ref_url="https://access.redhat.com/security/cve/CVE-2018-16871" source="CVE"/>
        <reference ref_id="CVE-2019-10639" ref_url="https://access.redhat.com/security/cve/CVE-2019-10639" source="CVE"/>
        <reference ref_id="CVE-2019-12819" ref_url="https://access.redhat.com/security/cve/CVE-2019-12819" source="CVE"/>
        <reference ref_id="CVE-2019-15090" ref_url="https://access.redhat.com/security/cve/CVE-2019-15090" source="CVE"/>
        <reference ref_id="CVE-2019-15099" ref_url="https://access.redhat.com/security/cve/CVE-2019-15099" source="CVE"/>
        <reference ref_id="CVE-2019-15221" ref_url="https://access.redhat.com/security/cve/CVE-2019-15221" source="CVE"/>
        <reference ref_id="CVE-2019-15223" ref_url="https://access.redhat.com/security/cve/CVE-2019-15223" source="CVE"/>
        <reference ref_id="CVE-2019-16234" ref_url="https://access.redhat.com/security/cve/CVE-2019-16234" source="CVE"/>
        <reference ref_id="CVE-2019-16746" ref_url="https://access.redhat.com/security/cve/CVE-2019-16746" source="CVE"/>
        <reference ref_id="CVE-2019-17053" ref_url="https://access.redhat.com/security/cve/CVE-2019-17053" source="CVE"/>
        <reference ref_id="CVE-2019-17055" ref_url="https://access.redhat.com/security/cve/CVE-2019-17055" source="CVE"/>
        <reference ref_id="CVE-2019-18282" ref_url="https://access.redhat.com/security/cve/CVE-2019-18282" source="CVE"/>
        <reference ref_id="CVE-2019-18805" ref_url="https://access.redhat.com/security/cve/CVE-2019-18805" source="CVE"/>
        <reference ref_id="CVE-2019-19045" ref_url="https://access.redhat.com/security/cve/CVE-2019-19045" source="CVE"/>
        <reference ref_id="CVE-2019-19047" ref_url="https://access.redhat.com/security/cve/CVE-2019-19047" source="CVE"/>
        <reference ref_id="CVE-2019-19055" ref_url="https://access.redhat.com/security/cve/CVE-2019-19055" source="CVE"/>
        <reference ref_id="CVE-2019-19057" ref_url="https://access.redhat.com/security/cve/CVE-2019-19057" source="CVE"/>
        <reference ref_id="CVE-2019-19058" ref_url="https://access.redhat.com/security/cve/CVE-2019-19058" source="CVE"/>
        <reference ref_id="CVE-2019-19059" ref_url="https://access.redhat.com/security/cve/CVE-2019-19059" source="CVE"/>
        <reference ref_id="CVE-2019-19065" ref_url="https://access.redhat.com/security/cve/CVE-2019-19065" source="CVE"/>
        <reference ref_id="CVE-2019-19067" ref_url="https://access.redhat.com/security/cve/CVE-2019-19067" source="CVE"/>
        <reference ref_id="CVE-2019-19073" ref_url="https://access.redhat.com/security/cve/CVE-2019-19073" source="CVE"/>
        <reference ref_id="CVE-2019-19074" ref_url="https://access.redhat.com/security/cve/CVE-2019-19074" source="CVE"/>
        <reference ref_id="CVE-2019-19077" ref_url="https://access.redhat.com/security/cve/CVE-2019-19077" source="CVE"/>
        <reference ref_id="CVE-2019-19532" ref_url="https://access.redhat.com/security/cve/CVE-2019-19532" source="CVE"/>
        <reference ref_id="CVE-2019-19534" ref_url="https://access.redhat.com/security/cve/CVE-2019-19534" source="CVE"/>
        <reference ref_id="CVE-2019-19768" ref_url="https://access.redhat.com/security/cve/CVE-2019-19768" source="CVE"/>
        <reference ref_id="CVE-2019-19922" ref_url="https://access.redhat.com/security/cve/CVE-2019-19922" source="CVE"/>
        <reference ref_id="CVE-2019-5108" ref_url="https://access.redhat.com/security/cve/CVE-2019-5108" source="CVE"/>
        <reference ref_id="CVE-2019-8980" ref_url="https://access.redhat.com/security/cve/CVE-2019-8980" source="CVE"/>
        <reference ref_id="CVE-2020-10690" ref_url="https://access.redhat.com/security/cve/CVE-2020-10690" source="CVE"/>
        <reference ref_id="CVE-2020-1749" ref_url="https://access.redhat.com/security/cve/CVE-2020-1749" source="CVE"/>
        <reference ref_id="CVE-2020-7053" ref_url="https://access.redhat.com/security/cve/CVE-2020-7053" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)

* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)

* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)

* kernel: unprivileged users able to create RAW sockets  in AF_IEEE802154 network protocol. (CVE-2019-17053)

* kernel: unprivileged users able to create RAW sockets in AF_ISDN  network protocol. (CVE-2019-17055)

* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)

* kernel: information leak bug caused  by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)

* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)

* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)

* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)

* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)

* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)

* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)

* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)

* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)

* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-16871" impact="moderate" public="20190603:0223">CVE-2018-16871</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-10639" impact="low" public="20190715">CVE-2019-10639</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-12819" impact="moderate" public="20190613">CVE-2019-12819</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-15090" impact="low" public="20190820">CVE-2019-15090</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-15099" impact="low" public="20190820">CVE-2019-15099</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15221" impact="low" public="20190802">CVE-2019-15221</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15223" impact="low" public="20190802">CVE-2019-15223</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16234" impact="low" public="20190909">CVE-2019-16234</cve>
          <cve cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-16746" impact="moderate" public="20190911">CVE-2019-16746</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-17053" impact="moderate" public="20190920">CVE-2019-17053</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2019-17055" impact="moderate" public="20190920">CVE-2019-17055</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-18282" impact="moderate" public="20191022">CVE-2019-18282</cve>
          <cve cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-18805" impact="moderate" public="20190416">CVE-2019-18805</cve>
          <cve cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19045" impact="moderate" public="20191118">CVE-2019-19045</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19047" impact="low" public="20191118">CVE-2019-19047</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19055" impact="moderate" public="20191005">CVE-2019-19055</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19057" impact="low" public="20191121">CVE-2019-19057</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19058" impact="low" public="20191121">CVE-2019-19058</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19059" impact="low" public="20191121">CVE-2019-19059</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19065" impact="low" public="20191121">CVE-2019-19065</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19067" impact="low" public="20191121">CVE-2019-19067</cve>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19073" impact="low" public="20191121">CVE-2019-19073</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-19074" impact="low" public="20191121">CVE-2019-19074</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19077" impact="moderate" public="20190910">CVE-2019-19077</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-19532" impact="moderate" public="20191203">CVE-2019-19532</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-772-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-19534" impact="moderate" public="20191104">CVE-2019-19534</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19768" impact="important" public="20191129">CVE-2019-19768</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19922" impact="low" public="20191222">CVE-2019-19922</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2019-5108" impact="moderate" public="20191211">CVE-2019-5108</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-8980" impact="moderate" public="20190218">CVE-2019-8980</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10690" impact="low" public="20191125:1253">CVE-2020-10690</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-319" href="https://access.redhat.com/security/cve/CVE-2020-1749" impact="moderate" public="20200304:0129">CVE-2020-1749</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-7053" impact="moderate" public="20200114">CVE-2020-7053</cve>
          <bugzilla href="https://bugzilla.redhat.com/1655162" id="1655162">CVE-2018-16871 kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1679972" id="1679972">CVE-2019-8980 kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1721962" id="1721962">CVE-2019-12819 kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1729933" id="1729933">CVE-2019-10639 Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743526" id="1743526">CVE-2019-15090 kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743560" id="1743560">CVE-2019-15099 kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749974" id="1749974">CVE-2019-15221 kernel: Null pointer dereference in the sound/usb/line6/pcm.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749976" id="1749976">CVE-2019-15223 kernel: Null pointer dereference in the sound/usb/line6/driver.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758242" id="1758242">CVE-2019-17053 kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1758248" id="1758248">CVE-2019-17055 kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760306" id="1760306">CVE-2019-16746 kernel: buffer-overflow hardening in WiFi beacon validation code.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760441" id="1760441">CVE-2019-16234 kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1771496" id="1771496">CVE-2019-18805 kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774933" id="1774933">CVE-2019-19074 kernel: a memory leak in the ath9k management function in allows local DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774937" id="1774937">CVE-2019-19073 kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774968" id="1774968">CVE-2019-19067 kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774983" id="1774983">CVE-2019-19045 kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774991" id="1774991">CVE-2019-19047 kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775000" id="1775000">CVE-2019-19065 kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775042" id="1775042">CVE-2019-19059 kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775047" id="1775047">CVE-2019-19058 kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775050" id="1775050">CVE-2019-19057 kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775074" id="1775074">CVE-2019-19055 kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775724" id="1775724">CVE-2019-19077 kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781821" id="1781821">CVE-2019-19532 kernel: malicious USB devices can lead to multiple out-of-bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783540" id="1783540">CVE-2019-19534 kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786164" id="1786164">CVE-2019-19768 kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789927" id="1789927">CVE-2019-5108 kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1792512" id="1792512">CVE-2019-19922 kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1795624" id="1795624">CVE-2020-7053 kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796360" id="1796360">CVE-2019-18282 kernel: The flow_dissector feature allows device tracking</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809833" id="1809833">CVE-2020-1749 kernel: some ipv6 protocols not encrypted over ipsec tunnel</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1817141" id="1817141">CVE-2020-10690 kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20201567025"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20201769052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20201769049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201787" version="635">
      <metadata>
        <title>ALSA-2020:1787: unzip security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1787" ref_url="https://errata.almalinux.org/8/ALSA-2020-1787.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1787" ref_url="https://access.redhat.com/errata/RHSA-2020:1787" source="RHSA"/>
        <reference ref_id="CVE-2019-13232" ref_url="https://access.redhat.com/security/cve/CVE-2019-13232" source="CVE"/>
        <description>The unzip utility is used to list, test, and extract files from zip archives.

Security Fix(es):

* unzip: overlapping of files in ZIP container leads to denial of service (CVE-2019-13232)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13232" impact="low" public="20190702">CVE-2019-13232</cve>
          <bugzilla href="https://bugzilla.redhat.com/1727761" id="1727761">CVE-2019-13232 unzip: overlapping of files in ZIP container leads to denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="unzip is earlier than 0:6.0-43.el8" test_ref="oval:org.almalinux.alsa:tst:20201787001"/>
          <criterion comment="unzip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201787002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201792" version="635">
      <metadata>
        <title>ALSA-2020:1792: curl security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1792" ref_url="https://errata.almalinux.org/8/ALSA-2020-1792.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1792" ref_url="https://access.redhat.com/errata/RHSA-2020:1792" source="RHSA"/>
        <reference ref_id="CVE-2019-5436" ref_url="https://access.redhat.com/security/cve/CVE-2019-5436" source="CVE"/>
        <reference ref_id="CVE-2019-5481" ref_url="https://access.redhat.com/security/cve/CVE-2019-5481" source="CVE"/>
        <reference ref_id="CVE-2019-5482" ref_url="https://access.redhat.com/security/cve/CVE-2019-5482" source="CVE"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: double free due to subsequent call of realloc() (CVE-2019-5481)

* curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)

* curl: TFTP receive heap buffer overflow in tftp_receive_packet() function (CVE-2019-5436)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-5436" impact="low" public="20190522">CVE-2019-5436</cve>
          <cve cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-5481" impact="moderate" public="20190911">CVE-2019-5481</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-5482" impact="moderate" public="20190911">CVE-2019-5482</cve>
          <bugzilla href="https://bugzilla.redhat.com/1710620" id="1710620">CVE-2019-5436 curl: TFTP receive heap buffer overflow in tftp_receive_packet() function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749402" id="1749402">CVE-2019-5481 curl: double free due to subsequent call of realloc()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1749652" id="1749652">CVE-2019-5482 curl: heap buffer overflow in function tftp_receive_packet()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="curl is earlier than 0:7.61.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201792001"/>
              <criterion comment="curl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl is earlier than 0:7.61.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201792003"/>
              <criterion comment="libcurl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-devel is earlier than 0:7.61.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201792005"/>
              <criterion comment="libcurl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-minimal is earlier than 0:7.61.1-12.el8" test_ref="oval:org.almalinux.alsa:tst:20201792007"/>
              <criterion comment="libcurl-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201794" version="638">
      <metadata>
        <title>ALSA-2020:1794: systemd security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1794" ref_url="https://errata.almalinux.org/8/ALSA-2020-1794.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1794" ref_url="https://access.redhat.com/errata/RHSA-2020:1794" source="RHSA"/>
        <reference ref_id="CVE-2019-3843" ref_url="https://access.redhat.com/security/cve/CVE-2019-3843" source="CVE"/>
        <reference ref_id="CVE-2019-3844" ref_url="https://access.redhat.com/security/cve/CVE-2019-3844" source="CVE"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: services with DynamicUser can create SUID/SGID binaries (CVE-2019-3843)

* systemd: services with DynamicUser can get new privileges and create SGID binaries (CVE-2019-3844)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-266" href="https://access.redhat.com/security/cve/CVE-2019-3843" impact="moderate" public="20190425">CVE-2019-3843</cve>
          <cve cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-268" href="https://access.redhat.com/security/cve/CVE-2019-3844" impact="moderate" public="20190425">CVE-2019-3844</cve>
          <bugzilla href="https://bugzilla.redhat.com/1684607" id="1684607">CVE-2019-3843 systemd: services with DynamicUser can create SUID/SGID binaries</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1684610" id="1684610">CVE-2019-3844 systemd: services with DynamicUser can get new privileges and create SGID binaries</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="systemd is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794001"/>
              <criterion comment="systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-container is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794003"/>
              <criterion comment="systemd-container is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-devel is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794005"/>
              <criterion comment="systemd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-journal-remote is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794007"/>
              <criterion comment="systemd-journal-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-libs is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794009"/>
              <criterion comment="systemd-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-pam is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794011"/>
              <criterion comment="systemd-pam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-tests is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794013"/>
              <criterion comment="systemd-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-udev is earlier than 0:239-29.el8" test_ref="oval:org.almalinux.alsa:tst:20201794015"/>
              <criterion comment="systemd-udev is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201797" version="639">
      <metadata>
        <title>ALSA-2020:1797: binutils security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1797" ref_url="https://errata.almalinux.org/8/ALSA-2020-1797.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1797" ref_url="https://access.redhat.com/errata/RHSA-2020:1797" source="RHSA"/>
        <reference ref_id="CVE-2019-1010204" ref_url="https://access.redhat.com/security/cve/CVE-2019-1010204" source="CVE"/>
        <reference ref_id="CVE-2019-17451" ref_url="https://access.redhat.com/security/cve/CVE-2019-17451" source="CVE"/>
        <description>The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

Security Fix(es):

* binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c (CVE-2019-17451)

* binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service (CVE-2019-1010204)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="(CWE-20|CWE-125)" href="https://access.redhat.com/security/cve/CVE-2019-1010204" impact="low" public="20190724">CVE-2019-1010204</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-17451" impact="low" public="20191007">CVE-2019-17451</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735604" id="1735604">CVE-2019-1010204 binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1771668" id="1771668">CVE-2019-17451 binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="binutils is earlier than 0:2.30-73.el8" test_ref="oval:org.almalinux.alsa:tst:20201797001"/>
              <criterion comment="binutils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201797002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="binutils-devel is earlier than 0:2.30-73.el8" test_ref="oval:org.almalinux.alsa:tst:20201797003"/>
              <criterion comment="binutils-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201797004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201804" version="638">
      <metadata>
        <title>ALSA-2020:1804: sudo security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1804" ref_url="https://errata.almalinux.org/8/ALSA-2020-1804.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1804" ref_url="https://access.redhat.com/errata/RHSA-2020:1804" source="RHSA"/>
        <reference ref_id="CVE-2019-19232" ref_url="https://access.redhat.com/security/cve/CVE-2019-19232" source="CVE"/>
        <reference ref_id="CVE-2019-19234" ref_url="https://access.redhat.com/security/cve/CVE-2019-19234" source="CVE"/>
        <description>The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

The following packages have been upgraded to a later upstream version: sudo (1.8.29). (BZ#1733961)

Security Fix(es):

* sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user (CVE-2019-19232)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-19232" impact="moderate" public="20191219">CVE-2019-19232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-19234" impact="moderate" public="20191219">CVE-2019-19234</cve>
          <bugzilla href="https://bugzilla.redhat.com/1786704" id="1786704">CVE-2019-19232 sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786708" id="1786708">CVE-2019-19234 sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="sudo is earlier than 0:1.8.29-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201804001"/>
          <criterion comment="sudo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193694002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201810" version="638">
      <metadata>
        <title>ALSA-2020:1810: sqlite security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1810" ref_url="https://errata.almalinux.org/8/ALSA-2020-1810.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1810" ref_url="https://access.redhat.com/errata/RHSA-2020:1810" source="RHSA"/>
        <reference ref_id="CVE-2019-13752" ref_url="https://access.redhat.com/security/cve/CVE-2019-13752" source="CVE"/>
        <reference ref_id="CVE-2019-13753" ref_url="https://access.redhat.com/security/cve/CVE-2019-13753" source="CVE"/>
        <reference ref_id="CVE-2019-19923" ref_url="https://access.redhat.com/security/cve/CVE-2019-19923" source="CVE"/>
        <reference ref_id="CVE-2019-19924" ref_url="https://access.redhat.com/security/cve/CVE-2019-19924" source="CVE"/>
        <reference ref_id="CVE-2019-19925" ref_url="https://access.redhat.com/security/cve/CVE-2019-19925" source="CVE"/>
        <reference ref_id="CVE-2019-19959" ref_url="https://access.redhat.com/security/cve/CVE-2019-19959" source="CVE"/>
        <reference ref_id="CVE-2019-8457" ref_url="https://access.redhat.com/security/cve/CVE-2019-8457" source="CVE"/>
        <description>SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: heap out-of-bound read in function rtreenode() (CVE-2019-8457)

* sqlite: fts3: improve shadow table corruption detection (CVE-2019-13752)

* sqlite: fts3: incorrectly removed corruption check (CVE-2019-13753)

* sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference (CVE-2019-19923)

* sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting (CVE-2019-19924)

* sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive (CVE-2019-19925)

* sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames (CVE-2019-19959)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-13752" impact="moderate" public="20191210">CVE-2019-13752</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-13753" impact="moderate" public="20191210">CVE-2019-13753</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-19923" impact="moderate" public="20200108">CVE-2019-19923</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-391" href="https://access.redhat.com/security/cve/CVE-2019-19924" impact="moderate" public="20200108">CVE-2019-19924</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-19925" impact="moderate" public="20200108">CVE-2019-19925</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-626" href="https://access.redhat.com/security/cve/CVE-2019-19959" impact="moderate" public="20191223">CVE-2019-19959</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-8457" impact="moderate" public="20190320">CVE-2019-8457</cve>
          <bugzilla href="https://bugzilla.redhat.com/1716881" id="1716881">CVE-2019-8457 sqlite: heap out-of-bound read in function rtreenode()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781999" id="1781999">CVE-2019-13752 sqlite: fts3: improve shadow table corruption detection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1782000" id="1782000">CVE-2019-13753 sqlite: fts3: incorrectly removed corruption check</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788842" id="1788842">CVE-2019-19924 sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788846" id="1788846">CVE-2019-19923 sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788866" id="1788866">CVE-2019-19925 sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789595" id="1789595">CVE-2019-19959 sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="lemon is earlier than 0:3.26.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201810001"/>
              <criterion comment="lemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite is earlier than 0:3.26.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201810003"/>
              <criterion comment="sqlite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-devel is earlier than 0:3.26.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201810005"/>
              <criterion comment="sqlite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-doc is earlier than 0:3.26.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201810007"/>
              <criterion comment="sqlite-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-libs is earlier than 0:3.26.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20201810009"/>
              <criterion comment="sqlite-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201827" version="635">
      <metadata>
        <title>ALSA-2020:1827: libxml2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1827" ref_url="https://errata.almalinux.org/8/ALSA-2020-1827.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1827" ref_url="https://access.redhat.com/errata/RHSA-2020:1827" source="RHSA"/>
        <reference ref_id="CVE-2018-14404" ref_url="https://access.redhat.com/security/cve/CVE-2018-14404" source="CVE"/>
        <reference ref_id="CVE-2018-9251" ref_url="https://access.redhat.com/security/cve/CVE-2018-9251" source="CVE"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404)

* libxml2: infinite loop in xz_decomp function in xzlib.c (CVE-2018-9251)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2018-14404" impact="moderate" public="20180618">CVE-2018-14404</cve>
          <cve cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2018-9251" impact="low" public="20180403">CVE-2018-9251</cve>
          <bugzilla href="https://bugzilla.redhat.com/1565318" id="1565318">CVE-2018-9251 libxml2: infinite loop in xz_decomp function in xzlib.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1595985" id="1595985">CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libxml2 is earlier than 0:2.9.7-7.el8" test_ref="oval:org.almalinux.alsa:tst:20201827001"/>
              <criterion comment="libxml2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libxml2-devel is earlier than 0:2.9.7-7.el8" test_ref="oval:org.almalinux.alsa:tst:20201827003"/>
              <criterion comment="libxml2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libxml2 is earlier than 0:2.9.7-7.el8" test_ref="oval:org.almalinux.alsa:tst:20201827005"/>
              <criterion comment="python3-libxml2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201828" version="636">
      <metadata>
        <title>ALSA-2020:1828: glibc security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1828" ref_url="https://errata.almalinux.org/8/ALSA-2020-1828.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1828" ref_url="https://access.redhat.com/errata/RHSA-2020:1828" source="RHSA"/>
        <reference ref_id="CVE-2019-19126" ref_url="https://access.redhat.com/security/cve/CVE-2019-19126" source="CVE"/>
        <description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-19126" impact="low" public="20191119">CVE-2019-19126</cve>
          <bugzilla href="https://bugzilla.redhat.com/1774681" id="1774681">CVE-2019-19126 glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="compat-libpthread-nonshared is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828001"/>
              <criterion comment="compat-libpthread-nonshared is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828003"/>
              <criterion comment="glibc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-all-langpacks is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828005"/>
              <criterion comment="glibc-all-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-benchtests is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828007"/>
              <criterion comment="glibc-benchtests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-common is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828009"/>
              <criterion comment="glibc-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-devel is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828011"/>
              <criterion comment="glibc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-headers is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828013"/>
              <criterion comment="glibc-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-aa is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828015"/>
              <criterion comment="glibc-langpack-aa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-af is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828017"/>
              <criterion comment="glibc-langpack-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-agr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828019"/>
              <criterion comment="glibc-langpack-agr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ak is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828021"/>
              <criterion comment="glibc-langpack-ak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-am is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828023"/>
              <criterion comment="glibc-langpack-am is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-an is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828025"/>
              <criterion comment="glibc-langpack-an is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-anp is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828027"/>
              <criterion comment="glibc-langpack-anp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ar is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828029"/>
              <criterion comment="glibc-langpack-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-as is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828031"/>
              <criterion comment="glibc-langpack-as is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ast is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828033"/>
              <criterion comment="glibc-langpack-ast is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ayc is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828035"/>
              <criterion comment="glibc-langpack-ayc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-az is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828037"/>
              <criterion comment="glibc-langpack-az is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-be is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828039"/>
              <criterion comment="glibc-langpack-be is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bem is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828041"/>
              <criterion comment="glibc-langpack-bem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ber is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828043"/>
              <criterion comment="glibc-langpack-ber is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bg is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828045"/>
              <criterion comment="glibc-langpack-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bhb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828047"/>
              <criterion comment="glibc-langpack-bhb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bho is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828049"/>
              <criterion comment="glibc-langpack-bho is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828051"/>
              <criterion comment="glibc-langpack-bi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828053"/>
              <criterion comment="glibc-langpack-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828055"/>
              <criterion comment="glibc-langpack-bo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-br is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828057"/>
              <criterion comment="glibc-langpack-br is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-brx is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828059"/>
              <criterion comment="glibc-langpack-brx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bs is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828061"/>
              <criterion comment="glibc-langpack-bs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-byn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828063"/>
              <criterion comment="glibc-langpack-byn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ca is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828065"/>
              <criterion comment="glibc-langpack-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ce is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828067"/>
              <criterion comment="glibc-langpack-ce is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-chr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828069"/>
              <criterion comment="glibc-langpack-chr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cmn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828071"/>
              <criterion comment="glibc-langpack-cmn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-crh is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828073"/>
              <criterion comment="glibc-langpack-crh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cs is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828075"/>
              <criterion comment="glibc-langpack-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-csb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828077"/>
              <criterion comment="glibc-langpack-csb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cv is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828079"/>
              <criterion comment="glibc-langpack-cv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cy is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828081"/>
              <criterion comment="glibc-langpack-cy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-da is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828083"/>
              <criterion comment="glibc-langpack-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-de is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828085"/>
              <criterion comment="glibc-langpack-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-doi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828087"/>
              <criterion comment="glibc-langpack-doi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dsb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828089"/>
              <criterion comment="glibc-langpack-dsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dv is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828091"/>
              <criterion comment="glibc-langpack-dv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dz is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828093"/>
              <criterion comment="glibc-langpack-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-el is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828095"/>
              <criterion comment="glibc-langpack-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-en is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828097"/>
              <criterion comment="glibc-langpack-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828099"/>
              <criterion comment="glibc-langpack-eo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-es is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828101"/>
              <criterion comment="glibc-langpack-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-et is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828103"/>
              <criterion comment="glibc-langpack-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828105"/>
              <criterion comment="glibc-langpack-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fa is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828107"/>
              <criterion comment="glibc-langpack-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ff is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828109"/>
              <criterion comment="glibc-langpack-ff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828111"/>
              <criterion comment="glibc-langpack-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fil is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828113"/>
              <criterion comment="glibc-langpack-fil is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828115"/>
              <criterion comment="glibc-langpack-fo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828117"/>
              <criterion comment="glibc-langpack-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fur is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828119"/>
              <criterion comment="glibc-langpack-fur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fy is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828121"/>
              <criterion comment="glibc-langpack-fy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ga is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828123"/>
              <criterion comment="glibc-langpack-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gd is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828125"/>
              <criterion comment="glibc-langpack-gd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gez is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828127"/>
              <criterion comment="glibc-langpack-gez is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828129"/>
              <criterion comment="glibc-langpack-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828131"/>
              <criterion comment="glibc-langpack-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gv is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828133"/>
              <criterion comment="glibc-langpack-gv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ha is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828135"/>
              <criterion comment="glibc-langpack-ha is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hak is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828137"/>
              <criterion comment="glibc-langpack-hak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-he is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828139"/>
              <criterion comment="glibc-langpack-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828141"/>
              <criterion comment="glibc-langpack-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hif is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828143"/>
              <criterion comment="glibc-langpack-hif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hne is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828145"/>
              <criterion comment="glibc-langpack-hne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828147"/>
              <criterion comment="glibc-langpack-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hsb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828149"/>
              <criterion comment="glibc-langpack-hsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ht is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828151"/>
              <criterion comment="glibc-langpack-ht is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828153"/>
              <criterion comment="glibc-langpack-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hy is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828155"/>
              <criterion comment="glibc-langpack-hy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ia is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828157"/>
              <criterion comment="glibc-langpack-ia is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-id is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828159"/>
              <criterion comment="glibc-langpack-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ig is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828161"/>
              <criterion comment="glibc-langpack-ig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ik is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828163"/>
              <criterion comment="glibc-langpack-ik is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-is is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828165"/>
              <criterion comment="glibc-langpack-is is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-it is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828167"/>
              <criterion comment="glibc-langpack-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-iu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828169"/>
              <criterion comment="glibc-langpack-iu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ja is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828171"/>
              <criterion comment="glibc-langpack-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ka is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828173"/>
              <criterion comment="glibc-langpack-ka is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kab is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828175"/>
              <criterion comment="glibc-langpack-kab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kk is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828177"/>
              <criterion comment="glibc-langpack-kk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828179"/>
              <criterion comment="glibc-langpack-kl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-km is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828181"/>
              <criterion comment="glibc-langpack-km is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828183"/>
              <criterion comment="glibc-langpack-kn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ko is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828185"/>
              <criterion comment="glibc-langpack-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kok is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828187"/>
              <criterion comment="glibc-langpack-kok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ks is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828189"/>
              <criterion comment="glibc-langpack-ks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ku is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828191"/>
              <criterion comment="glibc-langpack-ku is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kw is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828193"/>
              <criterion comment="glibc-langpack-kw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ky is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828195"/>
              <criterion comment="glibc-langpack-ky is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828197"/>
              <criterion comment="glibc-langpack-lb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lg is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828199"/>
              <criterion comment="glibc-langpack-lg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-li is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828201"/>
              <criterion comment="glibc-langpack-li is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lij is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828203"/>
              <criterion comment="glibc-langpack-lij is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ln is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828205"/>
              <criterion comment="glibc-langpack-ln is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828207"/>
              <criterion comment="glibc-langpack-lo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lt is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828209"/>
              <criterion comment="glibc-langpack-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lv is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828211"/>
              <criterion comment="glibc-langpack-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lzh is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828213"/>
              <criterion comment="glibc-langpack-lzh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513214"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mag is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828215"/>
              <criterion comment="glibc-langpack-mag is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513216"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mai is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828217"/>
              <criterion comment="glibc-langpack-mai is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513218"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mfe is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828219"/>
              <criterion comment="glibc-langpack-mfe is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513220"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mg is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828221"/>
              <criterion comment="glibc-langpack-mg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mhr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828223"/>
              <criterion comment="glibc-langpack-mhr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513224"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828225"/>
              <criterion comment="glibc-langpack-mi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513226"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-miq is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828227"/>
              <criterion comment="glibc-langpack-miq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513228"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mjw is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828229"/>
              <criterion comment="glibc-langpack-mjw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513230"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mk is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828231"/>
              <criterion comment="glibc-langpack-mk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513232"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ml is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828233"/>
              <criterion comment="glibc-langpack-ml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513234"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828235"/>
              <criterion comment="glibc-langpack-mn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513236"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mni is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828237"/>
              <criterion comment="glibc-langpack-mni is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513238"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828239"/>
              <criterion comment="glibc-langpack-mr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513240"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ms is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828241"/>
              <criterion comment="glibc-langpack-ms is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mt is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828243"/>
              <criterion comment="glibc-langpack-mt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513244"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-my is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828245"/>
              <criterion comment="glibc-langpack-my is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513246"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nan is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828247"/>
              <criterion comment="glibc-langpack-nan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513248"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nb is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828249"/>
              <criterion comment="glibc-langpack-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513250"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nds is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828251"/>
              <criterion comment="glibc-langpack-nds is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513252"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ne is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828253"/>
              <criterion comment="glibc-langpack-ne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513254"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nhn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828255"/>
              <criterion comment="glibc-langpack-nhn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513256"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-niu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828257"/>
              <criterion comment="glibc-langpack-niu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513258"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828259"/>
              <criterion comment="glibc-langpack-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513260"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828261"/>
              <criterion comment="glibc-langpack-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828263"/>
              <criterion comment="glibc-langpack-nr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513264"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nso is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828265"/>
              <criterion comment="glibc-langpack-nso is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513266"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-oc is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828267"/>
              <criterion comment="glibc-langpack-oc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513268"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-om is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828269"/>
              <criterion comment="glibc-langpack-om is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513270"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-or is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828271"/>
              <criterion comment="glibc-langpack-or is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513272"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-os is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828273"/>
              <criterion comment="glibc-langpack-os is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513274"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pa is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828275"/>
              <criterion comment="glibc-langpack-pa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513276"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pap is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828277"/>
              <criterion comment="glibc-langpack-pap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513278"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828279"/>
              <criterion comment="glibc-langpack-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513280"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ps is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828281"/>
              <criterion comment="glibc-langpack-ps is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pt is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828283"/>
              <criterion comment="glibc-langpack-pt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513284"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-quz is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828285"/>
              <criterion comment="glibc-langpack-quz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513286"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-raj is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828287"/>
              <criterion comment="glibc-langpack-raj is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513288"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ro is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828289"/>
              <criterion comment="glibc-langpack-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513290"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ru is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828291"/>
              <criterion comment="glibc-langpack-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513292"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-rw is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828293"/>
              <criterion comment="glibc-langpack-rw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513294"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sa is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828295"/>
              <criterion comment="glibc-langpack-sa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513296"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sah is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828297"/>
              <criterion comment="glibc-langpack-sah is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513298"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sat is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828299"/>
              <criterion comment="glibc-langpack-sat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513300"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sc is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828301"/>
              <criterion comment="glibc-langpack-sc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sd is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828303"/>
              <criterion comment="glibc-langpack-sd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513304"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-se is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828305"/>
              <criterion comment="glibc-langpack-se is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513306"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sgs is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828307"/>
              <criterion comment="glibc-langpack-sgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513308"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828309"/>
              <criterion comment="glibc-langpack-shn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513310"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shs is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828311"/>
              <criterion comment="glibc-langpack-shs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513312"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-si is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828313"/>
              <criterion comment="glibc-langpack-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513314"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sid is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828315"/>
              <criterion comment="glibc-langpack-sid is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513316"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sk is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828317"/>
              <criterion comment="glibc-langpack-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513318"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828319"/>
              <criterion comment="glibc-langpack-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513320"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sm is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828321"/>
              <criterion comment="glibc-langpack-sm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-so is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828323"/>
              <criterion comment="glibc-langpack-so is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513324"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sq is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828325"/>
              <criterion comment="glibc-langpack-sq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513326"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828327"/>
              <criterion comment="glibc-langpack-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513328"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ss is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828329"/>
              <criterion comment="glibc-langpack-ss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513330"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-st is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828331"/>
              <criterion comment="glibc-langpack-st is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513332"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sv is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828333"/>
              <criterion comment="glibc-langpack-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513334"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sw is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828335"/>
              <criterion comment="glibc-langpack-sw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513336"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-szl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828337"/>
              <criterion comment="glibc-langpack-szl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513338"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ta is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828339"/>
              <criterion comment="glibc-langpack-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513340"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tcy is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828341"/>
              <criterion comment="glibc-langpack-tcy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-te is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828343"/>
              <criterion comment="glibc-langpack-te is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513344"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tg is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828345"/>
              <criterion comment="glibc-langpack-tg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513346"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-th is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828347"/>
              <criterion comment="glibc-langpack-th is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513348"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-the is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828349"/>
              <criterion comment="glibc-langpack-the is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513350"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ti is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828351"/>
              <criterion comment="glibc-langpack-ti is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513352"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tig is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828353"/>
              <criterion comment="glibc-langpack-tig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513354"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tk is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828355"/>
              <criterion comment="glibc-langpack-tk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513356"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828357"/>
              <criterion comment="glibc-langpack-tl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513358"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tn is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828359"/>
              <criterion comment="glibc-langpack-tn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513360"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-to is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828361"/>
              <criterion comment="glibc-langpack-to is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tpi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828363"/>
              <criterion comment="glibc-langpack-tpi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513364"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tr is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828365"/>
              <criterion comment="glibc-langpack-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513366"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ts is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828367"/>
              <criterion comment="glibc-langpack-ts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513368"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tt is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828369"/>
              <criterion comment="glibc-langpack-tt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513370"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ug is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828371"/>
              <criterion comment="glibc-langpack-ug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513372"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uk is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828373"/>
              <criterion comment="glibc-langpack-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513374"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-unm is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828375"/>
              <criterion comment="glibc-langpack-unm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513376"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ur is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828377"/>
              <criterion comment="glibc-langpack-ur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513378"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uz is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828379"/>
              <criterion comment="glibc-langpack-uz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513380"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ve is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828381"/>
              <criterion comment="glibc-langpack-ve is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513382"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-vi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828383"/>
              <criterion comment="glibc-langpack-vi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513384"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wa is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828385"/>
              <criterion comment="glibc-langpack-wa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513386"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wae is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828387"/>
              <criterion comment="glibc-langpack-wae is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513388"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wal is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828389"/>
              <criterion comment="glibc-langpack-wal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513390"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828391"/>
              <criterion comment="glibc-langpack-wo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513392"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-xh is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828393"/>
              <criterion comment="glibc-langpack-xh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513394"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yi is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828395"/>
              <criterion comment="glibc-langpack-yi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513396"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yo is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828397"/>
              <criterion comment="glibc-langpack-yo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513398"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yue is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828399"/>
              <criterion comment="glibc-langpack-yue is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513400"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yuw is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828401"/>
              <criterion comment="glibc-langpack-yuw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zh is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828403"/>
              <criterion comment="glibc-langpack-zh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513404"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zu is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828405"/>
              <criterion comment="glibc-langpack-zu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513406"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-locale-source is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828407"/>
              <criterion comment="glibc-locale-source is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513408"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-minimal-langpack is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828409"/>
              <criterion comment="glibc-minimal-langpack is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513410"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-nss-devel is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828411"/>
              <criterion comment="glibc-nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513412"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-static is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828413"/>
              <criterion comment="glibc-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513414"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-utils is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828415"/>
              <criterion comment="glibc-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513416"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libnsl is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828417"/>
              <criterion comment="libnsl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513418"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nscd is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828419"/>
              <criterion comment="nscd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513420"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_db is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828421"/>
              <criterion comment="nss_db is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513422"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_hesiod is earlier than 0:2.28-101.el8" test_ref="oval:org.almalinux.alsa:tst:20201828423"/>
              <criterion comment="nss_hesiod is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513424"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201840" version="636">
      <metadata>
        <title>ALSA-2020:1840: openssl security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1840" ref_url="https://errata.almalinux.org/8/ALSA-2020-1840.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1840" ref_url="https://access.redhat.com/errata/RHSA-2020:1840" source="RHSA"/>
        <reference ref_id="CVE-2019-1547" ref_url="https://access.redhat.com/security/cve/CVE-2019-1547" source="CVE"/>
        <reference ref_id="CVE-2019-1549" ref_url="https://access.redhat.com/security/cve/CVE-2019-1549" source="CVE"/>
        <reference ref_id="CVE-2019-1563" ref_url="https://access.redhat.com/security/cve/CVE-2019-1563" source="CVE"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: side-channel weak encryption vulnerability (CVE-2019-1547)

* openssl: information disclosure in fork() (CVE-2019-1549)

* openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-602" href="https://access.redhat.com/security/cve/CVE-2019-1547" impact="moderate" public="20190910">CVE-2019-1547</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-1549" impact="low" public="20190910">CVE-2019-1549</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-1563" impact="low" public="20190910">CVE-2019-1563</cve>
          <bugzilla href="https://bugzilla.redhat.com/1752090" id="1752090">CVE-2019-1547 openssl: side-channel weak encryption vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1752095" id="1752095">CVE-2019-1549 openssl: information disclosure in fork()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1752100" id="1752100">CVE-2019-1563 openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openssl is earlier than 1:1.1.1c-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201840001"/>
              <criterion comment="openssl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-devel is earlier than 1:1.1.1c-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201840003"/>
              <criterion comment="openssl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-libs is earlier than 1:1.1.1c-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201840005"/>
              <criterion comment="openssl-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-perl is earlier than 1:1.1.1c-15.el8" test_ref="oval:org.almalinux.alsa:tst:20201840007"/>
              <criterion comment="openssl-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201845" version="638">
      <metadata>
        <title>ALSA-2020:1845: bind security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1845" ref_url="https://errata.almalinux.org/8/ALSA-2020-1845.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1845" ref_url="https://access.redhat.com/errata/RHSA-2020:1845" source="RHSA"/>
        <reference ref_id="CVE-2019-6477" ref_url="https://access.redhat.com/security/cve/CVE-2019-6477" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

The following packages have been upgraded to a later upstream version: bind (9.11.13). (BZ#1704328)

Security Fix(es):

* bind: TCP Pipelining doesn't limit TCP clients on a single connection (CVE-2019-6477)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-6477" impact="moderate" public="20191120">CVE-2019-6477</cve>
          <bugzilla href="https://bugzilla.redhat.com/1773617" id="1773617">CVE-2019-6477 bind: TCP Pipelining doesn't limit TCP clients on a single connection</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.13-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201845033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201852" version="638">
      <metadata>
        <title>ALSA-2020:1852: patch security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1852" ref_url="https://errata.almalinux.org/8/ALSA-2020-1852.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1852" ref_url="https://access.redhat.com/errata/RHSA-2020:1852" source="RHSA"/>
        <reference ref_id="CVE-2019-13636" ref_url="https://access.redhat.com/security/cve/CVE-2019-13636" source="CVE"/>
        <description>The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).

Security Fix(es):

* patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-59" href="https://access.redhat.com/security/cve/CVE-2019-13636" impact="moderate" public="20190724">CVE-2019-13636</cve>
          <bugzilla href="https://bugzilla.redhat.com/1732781" id="1732781">CVE-2019-13636 patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="patch is earlier than 0:2.7.6-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201852001"/>
          <criterion comment="patch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192798002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201864" version="638">
      <metadata>
        <title>ALSA-2020:1864: gcc security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1864" ref_url="https://errata.almalinux.org/8/ALSA-2020-1864.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1864" ref_url="https://access.redhat.com/errata/RHSA-2020:1864" source="RHSA"/>
        <reference ref_id="CVE-2019-15847" ref_url="https://access.redhat.com/security/cve/CVE-2019-15847" source="CVE"/>
        <description>The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.

Security Fix(es):

* gcc: POWER9 "DARN" RNG intrinsic produces repeated output (CVE-2019-15847)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-331" href="https://access.redhat.com/security/cve/CVE-2019-15847" impact="moderate" public="20190902">CVE-2019-15847</cve>
          <bugzilla href="https://bugzilla.redhat.com/1755523" id="1755523">CVE-2019-15847 gcc: POWER9 "DARN" RNG intrinsic produces repeated output</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cpp is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864001"/>
              <criterion comment="cpp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864003"/>
              <criterion comment="gcc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc-c++ is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864005"/>
              <criterion comment="gcc-c++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc-gdb-plugin is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864007"/>
              <criterion comment="gcc-gdb-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc-gfortran is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864009"/>
              <criterion comment="gcc-gfortran is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc-offload-nvptx is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864011"/>
              <criterion comment="gcc-offload-nvptx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gcc-plugin-devel is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864013"/>
              <criterion comment="gcc-plugin-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libasan is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864015"/>
              <criterion comment="libasan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libatomic is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864017"/>
              <criterion comment="libatomic is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libatomic-static is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864019"/>
              <criterion comment="libatomic-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgcc is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864021"/>
              <criterion comment="libgcc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgfortran is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864023"/>
              <criterion comment="libgfortran is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgomp is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864025"/>
              <criterion comment="libgomp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgomp-offload-nvptx is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864027"/>
              <criterion comment="libgomp-offload-nvptx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libitm is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864029"/>
              <criterion comment="libitm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libitm-devel is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864031"/>
              <criterion comment="libitm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="liblsan is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864033"/>
              <criterion comment="liblsan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libquadmath is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864035"/>
              <criterion comment="libquadmath is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libquadmath-devel is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864037"/>
              <criterion comment="libquadmath-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libstdc++ is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864039"/>
              <criterion comment="libstdc++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libstdc++-devel is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864041"/>
              <criterion comment="libstdc++-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libstdc++-docs is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864043"/>
              <criterion comment="libstdc++-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libstdc++-static is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864045"/>
              <criterion comment="libstdc++-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtsan is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864047"/>
              <criterion comment="libtsan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libubsan is earlier than 0:8.3.1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20201864049"/>
              <criterion comment="libubsan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201864050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201878" version="636">
      <metadata>
        <title>ALSA-2020:1878: samba security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1878" ref_url="https://errata.almalinux.org/8/ALSA-2020-1878.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1878" ref_url="https://access.redhat.com/errata/RHSA-2020:1878" source="RHSA"/>
        <reference ref_id="CVE-2019-10197" ref_url="https://access.redhat.com/security/cve/CVE-2019-10197" source="CVE"/>
        <reference ref_id="CVE-2019-10218" ref_url="https://access.redhat.com/security/cve/CVE-2019-10218" source="CVE"/>
        <reference ref_id="CVE-2019-14907" ref_url="https://access.redhat.com/security/cve/CVE-2019-14907" source="CVE"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.11.2). (BZ#1754409)

Security Fix(es):

* samba: Combination of parameters and permissions can allow user to escape from the share path definition (CVE-2019-10197)

* samba: smb client vulnerable to filenames containing path separators (CVE-2019-10218)

* samba: Crash after failed character conversion at log level 3 or above (CVE-2019-14907)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-10197" impact="moderate" public="20190903">CVE-2019-10197</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-10218" impact="moderate" public="20191029">CVE-2019-10218</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-14907" impact="moderate" public="20200121">CVE-2019-14907</cve>
          <bugzilla href="https://bugzilla.redhat.com/1746225" id="1746225">CVE-2019-10197 samba: Combination of parameters and permissions can allow user to escape from the share path definition</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1763137" id="1763137">CVE-2019-10218 samba: smb client vulnerable to filenames containing path separators</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791207" id="1791207">CVE-2019-14907 samba: Crash after failed character conversion at log level 3 or above</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openchange is earlier than 0:2.3-24.el8" test_ref="oval:org.almalinux.alsa:tst:20201878001"/>
              <criterion comment="openchange is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201878002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ctdb is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878003"/>
              <criterion comment="ctdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ctdb-tests is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878005"/>
              <criterion comment="ctdb-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsmbclient is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878007"/>
              <criterion comment="libsmbclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsmbclient-devel is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878009"/>
              <criterion comment="libsmbclient-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwbclient is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878011"/>
              <criterion comment="libwbclient is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwbclient-devel is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878013"/>
              <criterion comment="libwbclient-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-samba is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878015"/>
              <criterion comment="python3-samba is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-samba-test is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878017"/>
              <criterion comment="python3-samba-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878019"/>
              <criterion comment="samba is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-client is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878021"/>
              <criterion comment="samba-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-client-libs is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878023"/>
              <criterion comment="samba-client-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878025"/>
              <criterion comment="samba-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common-libs is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878027"/>
              <criterion comment="samba-common-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-common-tools is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878029"/>
              <criterion comment="samba-common-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-krb5-printing is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878031"/>
              <criterion comment="samba-krb5-printing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-libs is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878033"/>
              <criterion comment="samba-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-pidl is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878035"/>
              <criterion comment="samba-pidl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-test is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878037"/>
              <criterion comment="samba-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-test-libs is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878039"/>
              <criterion comment="samba-test-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878041"/>
              <criterion comment="samba-winbind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-clients is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878043"/>
              <criterion comment="samba-winbind-clients is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-krb5-locator is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878045"/>
              <criterion comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="samba-winbind-modules is earlier than 0:4.11.2-13.el8" test_ref="oval:org.almalinux.alsa:tst:20201878047"/>
              <criterion comment="samba-winbind-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193582046"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201880" version="637">
      <metadata>
        <title>ALSA-2020:1880: ibus and glib2 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1880" ref_url="https://errata.almalinux.org/8/ALSA-2020-1880.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1880" ref_url="https://access.redhat.com/errata/RHSA-2020:1880" source="RHSA"/>
        <reference ref_id="CVE-2019-14822" ref_url="https://access.redhat.com/security/cve/CVE-2019-14822" source="CVE"/>
        <description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.

Security Fix(es):

* ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" cwe="CWE-862" href="https://access.redhat.com/security/cve/CVE-2019-14822" impact="moderate" public="20190913:0700">CVE-2019-14822</cve>
          <bugzilla href="https://bugzilla.redhat.com/1717958" id="1717958">CVE-2019-14822 ibus: missing authorization allows local attacker to access the input bus of another user</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ibus is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880001"/>
              <criterion comment="ibus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-devel is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880003"/>
              <criterion comment="ibus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-devel-docs is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880005"/>
              <criterion comment="ibus-devel-docs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-gtk2 is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880007"/>
              <criterion comment="ibus-gtk2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-gtk3 is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880009"/>
              <criterion comment="ibus-gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-libs is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880011"/>
              <criterion comment="ibus-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-setup is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880013"/>
              <criterion comment="ibus-setup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ibus-wayland is earlier than 0:1.5.19-11.el8" test_ref="oval:org.almalinux.alsa:tst:20201880015"/>
              <criterion comment="ibus-wayland is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201880016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2 is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880017"/>
              <criterion comment="glib2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-devel is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880019"/>
              <criterion comment="glib2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-doc is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880021"/>
              <criterion comment="glib2-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-fam is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880023"/>
              <criterion comment="glib2-fam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-static is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880025"/>
              <criterion comment="glib2-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glib2-tests is earlier than 0:2.56.4-8.el8" test_ref="oval:org.almalinux.alsa:tst:20201880027"/>
              <criterion comment="glib2-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193530012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201912" version="635">
      <metadata>
        <title>ALSA-2020:1912: bluez security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1912" ref_url="https://errata.almalinux.org/8/ALSA-2020-1912.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1912" ref_url="https://access.redhat.com/errata/RHSA-2020:1912" source="RHSA"/>
        <reference ref_id="CVE-2018-10910" ref_url="https://access.redhat.com/security/cve/CVE-2018-10910" source="CVE"/>
        <description>The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (AlmaLinux), and pcmcia configuration files. 

Security Fix(es):

* bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices (CVE-2018-10910)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2018-10910" impact="low" public="20180720:1850">CVE-2018-10910</cve>
          <bugzilla href="https://bugzilla.redhat.com/1606203" id="1606203">CVE-2018-10910 bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bluez is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912001"/>
              <criterion comment="bluez is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-cups is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912003"/>
              <criterion comment="bluez-cups is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-hid2hci is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912005"/>
              <criterion comment="bluez-hid2hci is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-libs is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912007"/>
              <criterion comment="bluez-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-libs-devel is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912009"/>
              <criterion comment="bluez-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-obexd is earlier than 0:5.50-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201912011"/>
              <criterion comment="bluez-obexd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201913" version="638">
      <metadata>
        <title>ALSA-2020:1913: e2fsprogs security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1913" ref_url="https://errata.almalinux.org/8/ALSA-2020-1913.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1913" ref_url="https://access.redhat.com/errata/RHSA-2020:1913" source="RHSA"/>
        <reference ref_id="CVE-2019-5094" ref_url="https://access.redhat.com/security/cve/CVE-2019-5094" source="CVE"/>
        <reference ref_id="CVE-2019-5188" ref_url="https://access.redhat.com/security/cve/CVE-2019-5188" source="CVE"/>
        <description>The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.

The following packages have been upgraded to a later upstream version: e2fsprogs (1.45.4). (BZ#1783777)

Security Fix(es):

* e2fsprogs: crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-5094" impact="moderate" public="20190827">CVE-2019-5094</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-5188" impact="moderate" public="20200107">CVE-2019-5188</cve>
          <bugzilla href="https://bugzilla.redhat.com/1768555" id="1768555">CVE-2019-5094 e2fsprogs: Crafted ext4 partition leads to out-of-bounds write</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790048" id="1790048">CVE-2019-5188 e2fsprogs: Out-of-bounds write in e2fsck/rehash.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="e2fsprogs is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913001"/>
              <criterion comment="e2fsprogs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="e2fsprogs-devel is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913003"/>
              <criterion comment="e2fsprogs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="e2fsprogs-libs is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913005"/>
              <criterion comment="e2fsprogs-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcom_err is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913007"/>
              <criterion comment="libcom_err is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcom_err-devel is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913009"/>
              <criterion comment="libcom_err-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libss is earlier than 0:1.45.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20201913011"/>
              <criterion comment="libss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201913012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201916" version="636">
      <metadata>
        <title>ALSA-2020:1916: python-pip security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1916" ref_url="https://errata.almalinux.org/8/ALSA-2020-1916.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1916" ref_url="https://access.redhat.com/errata/RHSA-2020:1916" source="RHSA"/>
        <reference ref_id="CVE-2018-18074" ref_url="https://access.redhat.com/security/cve/CVE-2018-18074" source="CVE"/>
        <reference ref_id="CVE-2018-20060" ref_url="https://access.redhat.com/security/cve/CVE-2018-20060" source="CVE"/>
        <reference ref_id="CVE-2019-11236" ref_url="https://access.redhat.com/security/cve/CVE-2019-11236" source="CVE"/>
        <reference ref_id="CVE-2019-11324" ref_url="https://access.redhat.com/security/cve/CVE-2019-11324" source="CVE"/>
        <description>pip is a package management system used to install and manage software packages written in Python. Many packages can be found in the Python Package Index (PyPI). pip is a recursive acronym that can stand for either "Pip Installs Packages" or "Pip Installs Python". 

Security Fix(es):

* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060)

* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)

* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324)

* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2018-18074" impact="low" public="20180629">CVE-2018-18074</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2018-20060" impact="moderate" public="20180326">CVE-2018-20060</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2019-11236" impact="moderate" public="20190313">CVE-2019-11236</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2019-11324" impact="moderate" public="20190417">CVE-2019-11324</cve>
          <bugzilla href="https://bugzilla.redhat.com/1643829" id="1643829">CVE-2018-18074 python-requests: Redirect from HTTPS to HTTP does not remove Authorization header</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1649153" id="1649153">CVE-2018-20060 python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1700824" id="1700824">CVE-2019-11236 python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1702473" id="1702473">CVE-2019-11324 python-urllib3: Certification mishandle when error should be thrown</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python-pip is earlier than 0:9.0.3-16.el8" test_ref="oval:org.almalinux.alsa:tst:20201916001"/>
              <criterion comment="platform-python-pip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pip is earlier than 0:9.0.3-16.el8" test_ref="oval:org.almalinux.alsa:tst:20201916003"/>
              <criterion comment="python3-pip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pip-wheel is earlier than 0:9.0.3-16.el8" test_ref="oval:org.almalinux.alsa:tst:20201916005"/>
              <criterion comment="python3-pip-wheel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201921" version="639">
      <metadata>
        <title>ALSA-2020:1921: fontforge security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1921" ref_url="https://errata.almalinux.org/8/ALSA-2020-1921.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1921" ref_url="https://access.redhat.com/errata/RHSA-2020:1921" source="RHSA"/>
        <reference ref_id="CVE-2020-5395" ref_url="https://access.redhat.com/security/cve/CVE-2020-5395" source="CVE"/>
        <description>FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. 

Security Fix(es):

* fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c (CVE-2020-5395)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-5395" impact="moderate" public="20200103">CVE-2020-5395</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790041" id="1790041">CVE-2020-5395 fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="fontforge is earlier than 0:20170731-14.el8" test_ref="oval:org.almalinux.alsa:tst:20201921001"/>
          <criterion comment="fontforge is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201921002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201926" version="637">
      <metadata>
        <title>ALSA-2020:1926: container-tools:1.0 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1926" ref_url="https://errata.almalinux.org/8/ALSA-2020-1926.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1926" ref_url="https://access.redhat.com/errata/RHSA-2020:1926" source="RHSA"/>
        <reference ref_id="CVE-2020-10696" ref_url="https://access.redhat.com/security/cve/CVE-2020-10696" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* conflicting requests: failed to install container-tools:1.0 (BZ#1813776)

* podman run container error with avc denied (BZ#1816541)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-10696" impact="important" public="20200326">CVE-2020-10696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1817651" id="1817651">CVE-2020-10696 buildah: Crafted input tar file may lead to local file overwrite during image build process</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:1.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193494025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-4.gite94b4f9.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260031"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260032"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260033"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-3.git9ebe139.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260051"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-4.git1715c90.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260071"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260091"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260092"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260093"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260111"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260112"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260113"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260131"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260132"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260133"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260151"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260152"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260153"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260171"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260172"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260173"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260191"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-4.git921f98f.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260211"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260231"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260232"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260233"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260251"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260252"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260253"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-4.git1715c90.module_el8.2.0+303+1105185b" test_ref="oval:org.almalinux.alsa:tst:202019260271"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260291"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202019260292"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202019260293"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201931" version="637">
      <metadata>
        <title>ALSA-2020:1931: container-tools:2.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1931" ref_url="https://errata.almalinux.org/8/ALSA-2020-1931.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1931" ref_url="https://access.redhat.com/errata/RHSA-2020:1931" source="RHSA"/>
        <reference ref_id="CVE-2020-10696" ref_url="https://access.redhat.com/security/cve/CVE-2020-10696" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-10696" impact="important" public="20200326">CVE-2020-10696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1817651" id="1817651">CVE-2020-10696 buildah: Crafted input tar file may lead to local file overwrite during image build process</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:2.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20201931045"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-7.module_el8.2.0+458+dab581ed" test_ref="oval:org.almalinux.alsa:tst:202019310011"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-7.module_el8.2.0+458+dab581ed" test_ref="oval:org.almalinux.alsa:tst:202019310031"/>
              <criterion comment="buildah-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310051"/>
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310052"/>
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.6-1.module_el8.2.0+304+65a3c2ac" test_ref="oval:org.almalinux.alsa:tst:202019310071"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.module_el8.2.0+304+65a3c2ac" test_ref="oval:org.almalinux.alsa:tst:202019310091"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310111"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310112"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.40-9.module_el8.2.0+378+19727d8d" test_ref="oval:org.almalinux.alsa:tst:202019310131"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310151"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310152"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310171"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310172"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.2-5.module_el8.2.0+304+65a3c2ac" test_ref="oval:org.almalinux.alsa:tst:202019310191"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.6.4-11.module+el8.2.0+6369+1f4293b4" test_ref="oval:org.almalinux.alsa:tst:20201931021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.6.4-11.module+el8.2.0+6369+1f4293b4" test_ref="oval:org.almalinux.alsa:tst:20201931023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.6.4-11.module+el8.2.0+6369+1f4293b4" test_ref="oval:org.almalinux.alsa:tst:20201931025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.6.4-11.module+el8.2.0+6369+1f4293b4" test_ref="oval:org.almalinux.alsa:tst:20201931027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310291"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310292"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310311"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310312"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.4.0+2341+e90fd8eb" test_ref="oval:org.almalinux.alsa:tst:202019310331"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.3.0+479+69e2ae26" test_ref="oval:org.almalinux.alsa:tst:202019310332"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.4.0+522+66908d0c" test_ref="oval:org.almalinux.alsa:tst:202019310333"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.40-9.module_el8.2.0+378+19727d8d" test_ref="oval:org.almalinux.alsa:tst:202019310351"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.40-9.module_el8.2.0+378+19727d8d" test_ref="oval:org.almalinux.alsa:tst:202019310371"/>
              <criterion comment="skopeo-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310391"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310392"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310411"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310412"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202019310431"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202019310432"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201932" version="636">
      <metadata>
        <title>ALSA-2020:1932: container-tools:rhel8 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1932" ref_url="https://errata.almalinux.org/8/ALSA-2020-1932.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1932" ref_url="https://access.redhat.com/errata/RHSA-2020:1932" source="RHSA"/>
        <reference ref_id="CVE-2020-10696" ref_url="https://access.redhat.com/security/cve/CVE-2020-10696" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-10696" impact="important" public="20200326">CVE-2020-10696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1817651" id="1817651">CVE-2020-10696 buildah: Crafted input tar file may lead to local file overwrite during image build process</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.11.6-8.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.11.6-8.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:12-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320051"/>
              <criterion comment="cockpit-podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.6-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320071"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320091"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-5.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320111"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.40-11.module_el8.2.0+377+92552693" test_ref="oval:org.almalinux.alsa:tst:202019320131"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320151"/>
              <criterion comment="crit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320171"/>
              <criterion comment="criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.2-5.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320191"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.6.4-11.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.6.4-11.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.6.4-11.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.6.4-11.module+el8.2.0+6368+cf16aa14" test_ref="oval:org.almalinux.alsa:tst:20201932027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202019320291"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202019320292"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320311"/>
              <criterion comment="python3-criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-65.rc10.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320331"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.40-11.module_el8.2.0+377+92552693" test_ref="oval:org.almalinux.alsa:tst:202019320351"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.40-11.module_el8.2.0+377+92552693" test_ref="oval:org.almalinux.alsa:tst:202019320371"/>
              <criterion comment="skopeo-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320391"/>
              <criterion comment="slirp4netns is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320411"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202019320431"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201933" version="635">
      <metadata>
        <title>ALSA-2020:1933: targetcli security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1933" ref_url="https://errata.almalinux.org/8/ALSA-2020-1933.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1933" ref_url="https://access.redhat.com/errata/RHSA-2020:1933" source="RHSA"/>
        <reference ref_id="CVE-2020-10699" ref_url="https://access.redhat.com/security/cve/CVE-2020-10699" source="CVE"/>
        <description>The targetcli package contains an administration shell for configuring Internet Small Computer System Interface (iSCSI), Fibre Channel over Ethernet (FCoE), and other SCSI targets, using the Target Core Mod/Linux-IO (TCM/LIO) kernel target subsystem. FCoE users also need to install and use the fcoe-utils package.

Security Fix(es):

* targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands (CVE-2020-10699)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-28"/>
          <updated date="2020-04-28"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-10699" impact="important" public="20200323">CVE-2020-10699</cve>
          <bugzilla href="https://bugzilla.redhat.com/1819219" id="1819219">CVE-2020-10699 targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="targetcli is earlier than 0:2.1.51-4.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201933001"/>
          <criterion comment="targetcli is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201933002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201980" version="635">
      <metadata>
        <title>ALSA-2020:1980: git security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1980" ref_url="https://errata.almalinux.org/8/ALSA-2020-1980.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1980" ref_url="https://access.redhat.com/errata/RHSA-2020:1980" source="RHSA"/>
        <reference ref_id="CVE-2020-11008" ref_url="https://access.redhat.com/security/cve/CVE-2020-11008" source="CVE"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

The following packages have been upgraded to a later upstream version: git (2.18.4). (BZ#1826008)

Security Fix(es):

* git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak (CVE-2020-11008)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-30"/>
          <updated date="2020-04-30"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-11008" impact="important" public="20200420:1800">CVE-2020-11008</cve>
          <bugzilla href="https://bugzilla.redhat.com/1826001" id="1826001">CVE-2020-11008 git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="git is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980001"/>
              <criterion comment="git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-all is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980003"/>
              <criterion comment="git-all is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980005"/>
              <criterion comment="git-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-core-doc is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980007"/>
              <criterion comment="git-core-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-daemon is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980009"/>
              <criterion comment="git-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-email is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980011"/>
              <criterion comment="git-email is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-gui is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980013"/>
              <criterion comment="git-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-instaweb is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980015"/>
              <criterion comment="git-instaweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-subtree is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980017"/>
              <criterion comment="git-subtree is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="git-svn is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980019"/>
              <criterion comment="git-svn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitk is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980021"/>
              <criterion comment="gitk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gitweb is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980023"/>
              <criterion comment="gitweb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980025"/>
              <criterion comment="perl-Git is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Git-SVN is earlier than 0:2.18.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201980027"/>
              <criterion comment="perl-Git-SVN is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20194356028"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20201998" version="635">
      <metadata>
        <title>ALSA-2020:1998: gnutls security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:1998" ref_url="https://errata.almalinux.org/8/ALSA-2020-1998.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:1998" ref_url="https://access.redhat.com/errata/RHSA-2020:1998" source="RHSA"/>
        <reference ref_id="CVE-2020-11501" ref_url="https://access.redhat.com/security/cve/CVE-2020-11501" source="CVE"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: DTLS client hello contains a random value of all zeroes (CVE-2020-11501)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-04-30"/>
          <updated date="2020-04-30"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-11501" impact="moderate" public="20200327">CVE-2020-11501</cve>
          <bugzilla href="https://bugzilla.redhat.com/1821896" id="1821896">CVE-2020-11501 gnutls: DTLS client hello contains a random value of all zeroes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnutls is earlier than 0:3.6.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201998001"/>
              <criterion comment="gnutls is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-c++ is earlier than 0:3.6.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201998003"/>
              <criterion comment="gnutls-c++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-dane is earlier than 0:3.6.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201998005"/>
              <criterion comment="gnutls-dane is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-devel is earlier than 0:3.6.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201998007"/>
              <criterion comment="gnutls-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-utils is earlier than 0:3.6.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20201998009"/>
              <criterion comment="gnutls-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202031" version="635">
      <metadata>
        <title>ALSA-2020:2031: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2031" ref_url="https://errata.almalinux.org/8/ALSA-2020-2031.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2031" ref_url="https://access.redhat.com/errata/RHSA-2020:2031" source="RHSA"/>
        <reference ref_id="CVE-2020-12387" ref_url="https://access.redhat.com/security/cve/CVE-2020-12387" source="CVE"/>
        <reference ref_id="CVE-2020-12392" ref_url="https://access.redhat.com/security/cve/CVE-2020-12392" source="CVE"/>
        <reference ref_id="CVE-2020-12395" ref_url="https://access.redhat.com/security/cve/CVE-2020-12395" source="CVE"/>
        <reference ref_id="CVE-2020-6831" ref_url="https://access.redhat.com/security/cve/CVE-2020-6831" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.8.0 ESR.

Security Fix(es):

* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387)

* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395)

* Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831)

* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-06"/>
          <updated date="2020-05-06"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12387" impact="critical" public="20200505">CVE-2020-12387</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-552" href="https://access.redhat.com/security/cve/CVE-2020-12392" impact="moderate" public="20200505">CVE-2020-12392</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12395" impact="critical" public="20200505">CVE-2020-12395</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6831" impact="important" public="20200505">CVE-2020-6831</cve>
          <bugzilla href="https://bugzilla.redhat.com/1831761" id="1831761">CVE-2020-12387 Mozilla: Use-after-free during worker shutdown</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831763" id="1831763">CVE-2020-6831 usrsctp: Buffer overflow in AUTH chunk input validation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831764" id="1831764">CVE-2020-12392 Mozilla: Arbitrary local file access with 'Copy as cURL'</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831765" id="1831765">CVE-2020-12395 Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.8.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202031001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202041" version="635">
      <metadata>
        <title>ALSA-2020:2041: squid:4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2041" ref_url="https://errata.almalinux.org/8/ALSA-2020-2041.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2041" ref_url="https://access.redhat.com/errata/RHSA-2020:2041" source="RHSA"/>
        <reference ref_id="CVE-2019-12519" ref_url="https://access.redhat.com/security/cve/CVE-2019-12519" source="CVE"/>
        <reference ref_id="CVE-2019-12525" ref_url="https://access.redhat.com/security/cve/CVE-2019-12525" source="CVE"/>
        <reference ref_id="CVE-2020-11945" ref_url="https://access.redhat.com/security/cve/CVE-2020-11945" source="CVE"/>
        <description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519)

* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945)

* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-06"/>
          <updated date="2020-05-06"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-12519" impact="important" public="20200424">CVE-2019-12519</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-12525" impact="moderate" public="20190712">CVE-2019-12525</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-11945" impact="important" public="20200424">CVE-2020-11945</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730535" id="1730535">CVE-2019-12525 squid: parsing of header Proxy-Authentication leads to memory corruption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827552" id="1827552">CVE-2019-12519 squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827563" id="1827563">CVE-2020-11945 squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module squid:4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192593007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760011"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760012"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760031"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760032"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.2.0+319+d18e041f.1" test_ref="oval:org.almalinux.alsa:tst:202020410051"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.3.0+623+2bb85980.2" test_ref="oval:org.almalinux.alsa:tst:202020410052"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202046" version="636">
      <metadata>
        <title>ALSA-2020:2046: thunderbird security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2046" ref_url="https://errata.almalinux.org/8/ALSA-2020-2046.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2046" ref_url="https://access.redhat.com/errata/RHSA-2020:2046" source="RHSA"/>
        <reference ref_id="CVE-2020-12387" ref_url="https://access.redhat.com/security/cve/CVE-2020-12387" source="CVE"/>
        <reference ref_id="CVE-2020-12392" ref_url="https://access.redhat.com/security/cve/CVE-2020-12392" source="CVE"/>
        <reference ref_id="CVE-2020-12395" ref_url="https://access.redhat.com/security/cve/CVE-2020-12395" source="CVE"/>
        <reference ref_id="CVE-2020-12397" ref_url="https://access.redhat.com/security/cve/CVE-2020-12397" source="CVE"/>
        <reference ref_id="CVE-2020-6831" ref_url="https://access.redhat.com/security/cve/CVE-2020-6831" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.8.0.

Security Fix(es):

* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387)

* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395)

* usrsctp: Buffer overflow in AUTH chunk input validation (CVE-2020-6831)

* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)

* Mozilla: Sender Email Address Spoofing using encoded Unicode characters (CVE-2020-12397)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-11"/>
          <updated date="2020-05-11"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12387" impact="critical" public="20200505">CVE-2020-12387</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-552" href="https://access.redhat.com/security/cve/CVE-2020-12392" impact="moderate" public="20200505">CVE-2020-12392</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12395" impact="critical" public="20200505">CVE-2020-12395</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-172" href="https://access.redhat.com/security/cve/CVE-2020-12397" impact="low" public="20200505">CVE-2020-12397</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-6831" impact="important" public="20200505">CVE-2020-6831</cve>
          <bugzilla href="https://bugzilla.redhat.com/1831761" id="1831761">CVE-2020-12387 Mozilla: Use-after-free during worker shutdown</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831763" id="1831763">CVE-2020-6831 usrsctp: Buffer overflow in AUTH chunk input validation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831764" id="1831764">CVE-2020-12392 Mozilla: Arbitrary local file access with 'Copy as cURL'</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831765" id="1831765">CVE-2020-12395 Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832565" id="1832565">CVE-2020-12397 Mozilla: Sender Email Address Spoofing using encoded Unicode characters</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.8.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202046001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202070" version="636">
      <metadata>
        <title>ALSA-2020:2070: libreswan security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2070" ref_url="https://errata.almalinux.org/8/ALSA-2020-2070.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2070" ref_url="https://access.redhat.com/errata/RHSA-2020:2070" source="RHSA"/>
        <reference ref_id="CVE-2020-1763" ref_url="https://access.redhat.com/security/cve/CVE-2020-1763" source="CVE"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: DoS attack via malicious IKEv1 informational exchange message (CVE-2020-1763)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-12"/>
          <updated date="2020-05-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-1763" impact="important" public="20200511">CVE-2020-1763</cve>
          <bugzilla href="https://bugzilla.redhat.com/1814541" id="1814541">CVE-2020-1763 libreswan: DoS attack via malicious IKEv1 informational exchange message</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="libreswan is earlier than 0:3.29-7.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202070001"/>
          <criterion comment="libreswan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193391002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202102" version="637">
      <metadata>
        <title>ALSA-2020:2102: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2102" ref_url="https://errata.almalinux.org/8/ALSA-2020-2102.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2102" ref_url="https://access.redhat.com/errata/RHSA-2020:2102" source="RHSA"/>
        <reference ref_id="CVE-2020-10711" ref_url="https://access.redhat.com/security/cve/CVE-2020-10711" source="CVE"/>
        <reference ref_id="CVE-2020-11884" ref_url="https://access.redhat.com/security/cve/CVE-2020-11884" source="CVE"/>
        <reference ref_id="CVE-2020-2732" ref_url="https://access.redhat.com/security/cve/CVE-2020-2732" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)

* Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884)

* Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources (CVE-2020-2732)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [RHEL8.2][Azure]Commits to resolve high network latency (BZ#1817945)

* cpu.share scheduling performance issue (BZ#1819909)

* [DELL 8.2 BUG] [WD 19 SC/DC/TBT] ALSA:  Microphone can't record via front port after suspend (BZ#1821376)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-12"/>
          <updated date="2020-05-12"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-10711" impact="important" public="20200512:1200">CVE-2020-10711</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-1251" href="https://access.redhat.com/security/cve/CVE-2020-11884" impact="important" public="20200428:1800">CVE-2020-11884</cve>
          <cve cvss3="5.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-2732" impact="moderate" public="20200224:1800">CVE-2020-2732</cve>
          <bugzilla href="https://bugzilla.redhat.com/1805135" id="1805135">CVE-2020-2732 Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1825116" id="1825116">CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828149" id="1828149">CVE-2020-11884 Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.1.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202102051"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.1.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202102052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202102049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202125" version="637">
      <metadata>
        <title>ALSA-2020:2125: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2125" ref_url="https://errata.almalinux.org/8/ALSA-2020-2125.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2125" ref_url="https://access.redhat.com/errata/RHSA-2020:2125" source="RHSA"/>
        <reference ref_id="CVE-2020-10711" ref_url="https://access.redhat.com/security/cve/CVE-2020-10711" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-13"/>
          <updated date="2020-05-13"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-10711" impact="important" public="20200512:1200">CVE-2020-10711</cve>
          <bugzilla href="https://bugzilla.redhat.com/1825116" id="1825116">CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel version 0:4.18.0-193.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202125006"/>
            <criterion comment="kernel version 0:4.18.0-193.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202125007"/>
          </criteria>
          <criteria operator="AND">
            <criterion comment="kernel version equals 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125001"/>
            <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            <criteria operator="OR">
              <criterion comment="kpatch-patch not installed for 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125003"/>
              <criteria operator="AND">
                <criterion comment="kpatch-patch-4_18_0-193 is earlier than 0:1-2.el8" test_ref="oval:org.almalinux.alsa:tst:20202125004"/>
                <criterion comment="kpatch-patch-4_18_0-193 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202125005"/>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202143" version="638">
      <metadata>
        <title>ALSA-2020:2143: .NET Core security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2143" ref_url="https://errata.almalinux.org/8/ALSA-2020-2143.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2143" ref_url="https://access.redhat.com/errata/RHSA-2020:2143" source="RHSA"/>
        <reference ref_id="CVE-2020-1108" ref_url="https://access.redhat.com/security/cve/CVE-2020-1108" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

A new version of .NET Core that addresses a security vulnerability is now available. The updated version is .NET Core Runtime 2.1.18 and SDK 2.1.514.

Security Fix(es):

* dotnet: Denial of service via untrusted input (CVE-2020-1108)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-13"/>
          <updated date="2020-05-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-1108" impact="important" public="20200512">CVE-2020-1108</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827643" id="1827643">CVE-2020-1108 dotnet: Denial of service via untrusted input</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.18-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202143001"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.18-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202143003"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.514-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202143005"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.514-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202143007"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202171" version="637">
      <metadata>
        <title>ALSA-2020:2171: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2171" ref_url="https://errata.almalinux.org/8/ALSA-2020-2171.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2171" ref_url="https://access.redhat.com/errata/RHSA-2020:2171" source="RHSA"/>
        <reference ref_id="CVE-2020-10711" ref_url="https://access.redhat.com/security/cve/CVE-2020-10711" source="CVE"/>
        <reference ref_id="CVE-2020-2732" ref_url="https://access.redhat.com/security/cve/CVE-2020-2732" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)

* Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources (CVE-2020-2732)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest RHEL-8.2.z source tree (BZ#1831781)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-14"/>
          <updated date="2020-05-14"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-10711" impact="important" public="20200512:1200">CVE-2020-10711</cve>
          <cve cvss3="5.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-2732" impact="moderate" public="20200224:1800">CVE-2020-2732</cve>
          <bugzilla href="https://bugzilla.redhat.com/1805135" id="1805135">CVE-2020-2732 Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1825116" id="1825116">CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.1.2.rt13.53.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202102051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.1.2.rt13.53.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202171026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.1.2.rt13.53.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202171023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202241" version="636">
      <metadata>
        <title>ALSA-2020:2241: java-1.8.0-ibm security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2241" ref_url="https://errata.almalinux.org/8/ALSA-2020-2241.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2241" ref_url="https://access.redhat.com/errata/RHSA-2020:2241" source="RHSA"/>
        <reference ref_id="CVE-2019-2949" ref_url="https://access.redhat.com/security/cve/CVE-2019-2949" source="CVE"/>
        <reference ref_id="CVE-2020-2654" ref_url="https://access.redhat.com/security/cve/CVE-2020-2654" source="CVE"/>
        <reference ref_id="CVE-2020-2754" ref_url="https://access.redhat.com/security/cve/CVE-2020-2754" source="CVE"/>
        <reference ref_id="CVE-2020-2755" ref_url="https://access.redhat.com/security/cve/CVE-2020-2755" source="CVE"/>
        <reference ref_id="CVE-2020-2756" ref_url="https://access.redhat.com/security/cve/CVE-2020-2756" source="CVE"/>
        <reference ref_id="CVE-2020-2757" ref_url="https://access.redhat.com/security/cve/CVE-2020-2757" source="CVE"/>
        <reference ref_id="CVE-2020-2781" ref_url="https://access.redhat.com/security/cve/CVE-2020-2781" source="CVE"/>
        <reference ref_id="CVE-2020-2800" ref_url="https://access.redhat.com/security/cve/CVE-2020-2800" source="CVE"/>
        <reference ref_id="CVE-2020-2803" ref_url="https://access.redhat.com/security/cve/CVE-2020-2803" source="CVE"/>
        <reference ref_id="CVE-2020-2805" ref_url="https://access.redhat.com/security/cve/CVE-2020-2805" source="CVE"/>
        <reference ref_id="CVE-2020-2830" ref_url="https://access.redhat.com/security/cve/CVE-2020-2830" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP10.

Security Fix(es):

* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949)

* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803)

* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805)

* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)

* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781)

* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800)

* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830)

* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)

* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755)

* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756)

* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-20"/>
          <updated date="2020-05-20"/>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2019-2949" impact="important" public="20191015">CVE-2019-2949</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-2654" impact="moderate" public="20200114">CVE-2020-2654</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2754" impact="low" public="20200414">CVE-2020-2754</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2755" impact="low" public="20200414">CVE-2020-2755</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2756" impact="low" public="20200414">CVE-2020-2756</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2757" impact="low" public="20200414">CVE-2020-2757</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2020-2781" impact="moderate" public="20200414">CVE-2020-2781</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2020-2800" impact="moderate" public="20200414">CVE-2020-2800</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-2803" impact="important" public="20200414">CVE-2020-2803</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2805" impact="important" public="20200414">CVE-2020-2805</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-185-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2830" impact="moderate" public="20200414">CVE-2020-2830</cve>
          <bugzilla href="https://bugzilla.redhat.com/1761594" id="1761594">CVE-2019-2949 OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791217" id="1791217">CVE-2020-2654 OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823199" id="1823199">CVE-2020-2754 OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823200" id="1823200">CVE-2020-2755 OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823215" id="1823215">CVE-2020-2756 OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823216" id="1823216">CVE-2020-2757 OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823527" id="1823527">CVE-2020-2800 OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823542" id="1823542">CVE-2020-2830 OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823694" id="1823694">CVE-2020-2803 OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823844" id="1823844">CVE-2020-2805 OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1823960" id="1823960">CVE-2020-2781 OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202241015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202250" version="636">
      <metadata>
        <title>ALSA-2020:2250: dotnet3.1 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2250" ref_url="https://errata.almalinux.org/8/ALSA-2020-2250.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2250" ref_url="https://access.redhat.com/errata/RHSA-2020:2250" source="RHSA"/>
        <reference ref_id="CVE-2020-1108" ref_url="https://access.redhat.com/security/cve/CVE-2020-1108" source="CVE"/>
        <reference ref_id="CVE-2020-1161" ref_url="https://access.redhat.com/security/cve/CVE-2020-1161" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.1.104 and .NET Core Runtime 3.1.4.

Security Fixes:

* dotnet: Denial of service via untrusted input (CVE-2020-1108)
* dotnet: Denial of service due to infinite loop (CVE-2020-1161)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-21"/>
          <updated date="2020-05-21"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-1108" impact="important" public="20200512">CVE-2020-1108</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-1161" impact="important" public="20200512">CVE-2020-1161</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827643" id="1827643">CVE-2020-1108 dotnet: Denial of service via untrusted input</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827645" id="1827645">CVE-2020-1161 dotnet: Denial of service due to infinite loop</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.1.104-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250007"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250011"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250013"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.104-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250015"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.4-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250017"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.104-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250019"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.1.104-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202250021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202336" version="635">
      <metadata>
        <title>ALSA-2020:2336: freerdp security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2336" ref_url="https://errata.almalinux.org/8/ALSA-2020-2336.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2336" ref_url="https://access.redhat.com/errata/RHSA-2020:2336" source="RHSA"/>
        <reference ref_id="CVE-2020-11521" ref_url="https://access.redhat.com/security/cve/CVE-2020-11521" source="CVE"/>
        <reference ref_id="CVE-2020-11523" ref_url="https://access.redhat.com/security/cve/CVE-2020-11523" source="CVE"/>
        <reference ref_id="CVE-2020-11524" ref_url="https://access.redhat.com/security/cve/CVE-2020-11524" source="CVE"/>
        <description>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: Out-of-bounds write in planar.c (CVE-2020-11521)

* freerdp: Integer overflow in region.c (CVE-2020-11523)

* freerdp: Out-of-bounds write in interleaved.c (CVE-2020-11524)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-28"/>
          <updated date="2020-05-28"/>
          <cve cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11521" impact="important" public="20200409">CVE-2020-11521</cve>
          <cve cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-11523" impact="important" public="20200409">CVE-2020-11523</cve>
          <cve cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11524" impact="important" public="20200409">CVE-2020-11524</cve>
          <bugzilla href="https://bugzilla.redhat.com/1836214" id="1836214">CVE-2020-11521 freerdp: Out-of-bounds write in planar.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836226" id="1836226">CVE-2020-11524 freerdp: Out-of-bounds write in interleaved.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836234" id="1836234">CVE-2020-11523 freerdp: Integer overflow in region.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freerdp is earlier than 2:2.0.0-46.rc4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202336001"/>
              <criterion comment="freerdp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-devel is earlier than 2:2.0.0-46.rc4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202336003"/>
              <criterion comment="freerdp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-libs is earlier than 2:2.0.0-46.rc4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202336005"/>
              <criterion comment="freerdp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr is earlier than 2:2.0.0-46.rc4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202336007"/>
              <criterion comment="libwinpr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr-devel is earlier than 2:2.0.0-46.rc4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202336009"/>
              <criterion comment="libwinpr-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202338" version="635">
      <metadata>
        <title>ALSA-2020:2338: bind security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2338" ref_url="https://errata.almalinux.org/8/ALSA-2020-2338.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2338" ref_url="https://access.redhat.com/errata/RHSA-2020:2338" source="RHSA"/>
        <reference ref_id="CVE-2020-8616" ref_url="https://access.redhat.com/security/cve/CVE-2020-8616" source="CVE"/>
        <reference ref_id="CVE-2020-8617" ref_url="https://access.redhat.com/security/cve/CVE-2020-8617" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616)

* bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-05-28"/>
          <updated date="2020-05-28"/>
          <cve cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8616" impact="important" public="20200519">CVE-2020-8616</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2020-8617" impact="important" public="20200519">CVE-2020-8617</cve>
          <bugzilla href="https://bugzilla.redhat.com/1836118" id="1836118">CVE-2020-8616 bind: BIND does not sufficiently limit the number of fetches performed when processing referrals</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836124" id="1836124">CVE-2020-8617 bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.13-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202338033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202379" version="637">
      <metadata>
        <title>ALSA-2020:2379: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2379" ref_url="https://errata.almalinux.org/8/ALSA-2020-2379.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2379" ref_url="https://access.redhat.com/errata/RHSA-2020:2379" source="RHSA"/>
        <reference ref_id="CVE-2020-12405" ref_url="https://access.redhat.com/security/cve/CVE-2020-12405" source="CVE"/>
        <reference ref_id="CVE-2020-12406" ref_url="https://access.redhat.com/security/cve/CVE-2020-12406" source="CVE"/>
        <reference ref_id="CVE-2020-12410" ref_url="https://access.redhat.com/security/cve/CVE-2020-12410" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.9.0 ESR.

Security Fix(es):

* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405)

* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406)

* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-03"/>
          <updated date="2020-06-03"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12405" impact="important" public="20200602">CVE-2020-12405</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-12406" impact="important" public="20200602">CVE-2020-12406</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12410" impact="important" public="20200602">CVE-2020-12410</cve>
          <bugzilla href="https://bugzilla.redhat.com/1843030" id="1843030">CVE-2020-12410 Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1843312" id="1843312">CVE-2020-12406 Mozilla: JavaScript Type confusion with NativeTypes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1843313" id="1843313">CVE-2020-12405 Mozilla: Use-after-free in SharedWorkerService</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.9.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202379001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202407" version="636">
      <metadata>
        <title>ALSA-2020:2407: freerdp security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2407" ref_url="https://errata.almalinux.org/8/ALSA-2020-2407.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2407" ref_url="https://access.redhat.com/errata/RHSA-2020:2407" source="RHSA"/>
        <reference ref_id="CVE-2020-13398" ref_url="https://access.redhat.com/security/cve/CVE-2020-13398" source="CVE"/>
        <description>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c (CVE-2020-13398)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-04"/>
          <updated date="2020-06-04"/>
          <cve cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cwe="CWE-805-&gt;CWE-122-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-13398" impact="important" public="20200522">CVE-2020-13398</cve>
          <bugzilla href="https://bugzilla.redhat.com/1841199" id="1841199">CVE-2020-13398 freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freerdp is earlier than 2:2.0.0-46.rc4.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20202407001"/>
              <criterion comment="freerdp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-devel is earlier than 2:2.0.0-46.rc4.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20202407003"/>
              <criterion comment="freerdp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-libs is earlier than 2:2.0.0-46.rc4.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20202407005"/>
              <criterion comment="freerdp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr is earlier than 2:2.0.0-46.rc4.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20202407007"/>
              <criterion comment="libwinpr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr-devel is earlier than 2:2.0.0-46.rc4.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20202407009"/>
              <criterion comment="libwinpr-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202416" version="635">
      <metadata>
        <title>ALSA-2020:2416: unbound security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2416" ref_url="https://errata.almalinux.org/8/ALSA-2020-2416.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2416" ref_url="https://access.redhat.com/errata/RHSA-2020:2416" source="RHSA"/>
        <reference ref_id="CVE-2020-12662" ref_url="https://access.redhat.com/security/cve/CVE-2020-12662" source="CVE"/>
        <reference ref_id="CVE-2020-12663" ref_url="https://access.redhat.com/security/cve/CVE-2020-12663" source="CVE"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. 

Security Fix(es):

* unbound: amplification of an incoming query into a large number of queries directed to a target (CVE-2020-12662)

* unbound: infinite loop via malformed DNS answers received from upstream servers (CVE-2020-12663)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-08"/>
          <updated date="2020-06-08"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-406-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-12662" impact="important" public="20200519">CVE-2020-12662</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-12663" impact="important" public="20200519">CVE-2020-12663</cve>
          <bugzilla href="https://bugzilla.redhat.com/1837597" id="1837597">CVE-2020-12662 unbound: amplification of an incoming query into a large number of queries directed to a target</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1837604" id="1837604">CVE-2020-12663 unbound: infinite loop via malformed DNS answers received from upstream servers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python3-unbound is earlier than 0:1.7.3-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202416001"/>
              <criterion comment="python3-unbound is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound is earlier than 0:1.7.3-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202416003"/>
              <criterion comment="unbound is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound-devel is earlier than 0:1.7.3-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202416005"/>
              <criterion comment="unbound-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="unbound-libs is earlier than 0:1.7.3-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202416007"/>
              <criterion comment="unbound-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201716008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202427" version="643">
      <metadata>
        <title>ALSA-2020:2427: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2427" ref_url="https://errata.almalinux.org/8/ALSA-2020-2427.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2427" ref_url="https://access.redhat.com/errata/RHSA-2020:2427" source="RHSA"/>
        <reference ref_id="CVE-2020-12657" ref_url="https://access.redhat.com/security/cve/CVE-2020-12657" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827191)

* ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets (BZ#1821375)

* IB/core: deadlock on rdma_nl_mutex when netlink triggers on-demand modprobe rdma_cm (BZ#1821381)

* dm: fix excessive bio splitting that results in performance regressions (BZ#1821382)

* system time jumps when hotplug vcpu on a long uptime guest (BZ#1822498)

* [DELL 8.2 BUG]Ethernet : e1000e doesn't work after S2I (BZ#1825262)

* NFSv3 sec=krb5p fails against an ONTAP server (BZ#1826219)

* Stand-alone CPU Linpack test reports bad residual on HPC Cluster node(s) while running RHEL 8 (BZ#1827619)

* [DELL 8.2 BUG]bluetooth Scanning  block S3 and  Suspend to idle (BZ#1827620)

* RHEL8.2 Beta - SMC-R connection with vlan-id fails (BZ#1827631)

* RHEL8.1 - RHEL8.1 kernel 4.18.0-147.3.1.el8.bz181950_test001.ppc64le+debug failed during LPM test (p8/p9):idahop08:LPM (vtpm) (BZ#1827632)

* missing version.h dependency for modpost may cause build to fail (BZ#1828229)

* efi: kernel panic during ltp fs test - read_all -d /sys -q -r 10 (BZ#1829527)

* Let "isolcpus=" skip unknown sub-parameters (BZ#1832367)

* RHEL8.0 - Very bad performance with small blocks in FC-IO found by SAP HANA on POWER tests on RHEL8.0 (compared to RHEL7.4) (BZ#1834517)

* [FJ8.2 Bug]: [REG] NFS-client panic at nfs4_get_valid_delegation+0x1c/0x40 [nfsv4] (BZ#1837969)

* [RHEL-8.3] upstream bonding driver refresh (BZ#1838477)

* Enable xt_u32 module (BZ#1840799)

* Move xt_u32 module to kernel-modules-extra (BZ#1840800)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-09"/>
          <updated date="2020-06-09"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12657" impact="important" public="20200505">CVE-2020-12657</cve>
          <bugzilla href="https://bugzilla.redhat.com/1832866" id="1832866">CVE-2020-12657 kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.6.3.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202427051"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.6.3.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202427052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202427049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202428" version="639">
      <metadata>
        <title>ALSA-2020:2428: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2428" ref_url="https://errata.almalinux.org/8/ALSA-2020-2428.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2428" ref_url="https://access.redhat.com/errata/RHSA-2020:2428" source="RHSA"/>
        <reference ref_id="CVE-2020-12657" ref_url="https://access.redhat.com/security/cve/CVE-2020-12657" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827193)

* kernel-rt: update RT source tree to the RHEL-8.2.z1 source tree (BZ#1816271)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-09"/>
          <updated date="2020-06-09"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12657" impact="important" public="20200505">CVE-2020-12657</cve>
          <bugzilla href="https://bugzilla.redhat.com/1832866" id="1832866">CVE-2020-12657 kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.6.3.rt13.59.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202427051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.6.3.rt13.59.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202428026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.6.3.rt13.59.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202428023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202431" version="642">
      <metadata>
        <title>ALSA-2020:2431: microcode_ctl security, bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2431" ref_url="https://errata.almalinux.org/8/ALSA-2020-2431.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2431" ref_url="https://access.redhat.com/errata/RHSA-2020:2431" source="RHSA"/>
        <reference ref_id="CVE-2020-0543" ref_url="https://access.redhat.com/security/cve/CVE-2020-0543" source="CVE"/>
        <reference ref_id="CVE-2020-0548" ref_url="https://access.redhat.com/security/cve/CVE-2020-0548" source="CVE"/>
        <reference ref_id="CVE-2020-0549" ref_url="https://access.redhat.com/security/cve/CVE-2020-0549" source="CVE"/>
        <description>Security Fix(es):

* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)

* hw: L1D Cache Eviction Sampling (CVE-2020-0549)

* hw: Vector Register Data Sampling (CVE-2020-0548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es) and Enhancement(s):

* Update Intel CPU microcode to microcode-20200602 release, addresses:
  - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
    up to 0x621;
  - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
    up to 0x71a;
  - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
  - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
    up to 0x2f;
  - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
    up to 0x26;
  - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
  - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
    up to 0x22;
  - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
    up to 0xdc;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
    up to 0x1000157;
  - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
    (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
    up to 0x2006906;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
    up to 0x4002f01;
  - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
    up to 0x5002f01;
  - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
    up to 0xdc;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
    up to 0x78;
  - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
    from revision 0xca up to 0xd6;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
    0xca up to 0xd6;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
  - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
    up to 0xd6;
  - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
   - Change the URL to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore.

* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment
  models.

* Re-generate initramfs not only for the currently running kernel,
  but for several recently installed kernels as well.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-09"/>
          <updated date="2020-06-09"/>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-0543" impact="moderate" public="20200609:1700">CVE-2020-0543</cve>
          <cve cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-203-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-0548" impact="low" public="20200127:1300">CVE-2020-0548</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-203-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-0549" impact="moderate" public="20200127:1300">CVE-2020-0549</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788786" id="1788786">CVE-2020-0548 hw: Vector Register Data Sampling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788788" id="1788788">CVE-2020-0549 hw: L1D Cache Eviction Sampling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827165" id="1827165">CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl is earlier than 4:20191115-4.20200602.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202431001"/>
          <criterion comment="microcode_ctl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20210621002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202450" version="637">
      <metadata>
        <title>ALSA-2020:2450: .NET Core 3.1 on AlmaLinux 8 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2450" ref_url="https://errata.almalinux.org/8/ALSA-2020-2450.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2450" ref_url="https://access.redhat.com/errata/RHSA-2020:2450" source="RHSA"/>
        <reference ref_id="CVE-2020-1108" ref_url="https://access.redhat.com/security/cve/CVE-2020-1108" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.105 and .NET Core Runtime 3.1.5.

Security Fixes:

* dotnet: Denial of service via untrusted input (CVE-2020-1108)

This is an additional update to comprehensively address CVE-2020-1108.

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-09"/>
          <updated date="2020-06-09"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-1108" impact="important" public="20200512">CVE-2020-1108</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827643" id="1827643">CVE-2020-1108 dotnet: Denial of service via untrusted input</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.1.105-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450007"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450011"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450013"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.105-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450015"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.5-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450017"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.105-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450019"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.1.105-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202450021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202462" version="635">
      <metadata>
        <title>ALSA-2020:2462: pcs security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2462" ref_url="https://errata.almalinux.org/8/ALSA-2020-2462.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2462" ref_url="https://access.redhat.com/errata/RHSA-2020:2462" source="RHSA"/>
        <reference ref_id="CVE-2020-10663" ref_url="https://access.redhat.com/security/cve/CVE-2020-10663" source="CVE"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* rubygem-json: Unsafe Object Creation Vulnerability in JSON (CVE-2020-10663)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* pcs status on remotes is not working on rhel8.2 any longer (BZ#1832914)

* pcs cluster stop --all throws errors and doesn't seem to honor the request-timeout option (BZ#1838084)

* [GUI] Colocation constraint can't be added (BZ#1840158)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-10"/>
          <updated date="2020-06-10"/>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-20-&gt;CWE-94" href="https://access.redhat.com/security/cve/CVE-2020-10663" impact="moderate" public="20200319">CVE-2020-10663</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827500" id="1827500">CVE-2020-10663 rubygem-json: Unsafe object creation vulnerability in JSON</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::resilientstorage</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pcs is earlier than 0:0.10.4-6.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202462001"/>
              <criterion comment="pcs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202462002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcs-snmp is earlier than 0:0.10.4-6.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202462003"/>
              <criterion comment="pcs-snmp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202462004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202471" version="638">
      <metadata>
        <title>ALSA-2020:2471: .NET Core on AlmaLinux 8 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2471" ref_url="https://errata.almalinux.org/8/ALSA-2020-2471.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2471" ref_url="https://access.redhat.com/errata/RHSA-2020:2471" source="RHSA"/>
        <reference ref_id="CVE-2020-1108" ref_url="https://access.redhat.com/security/cve/CVE-2020-1108" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

A new version of .NET Core that addresses a security vulnerability is now available. The updated version is .NET Core Runtime 2.1.19 and SDK 2.1.515.

Security Fix(es):

* dotnet: Denial of service via untrusted input (CVE-2020-1108)

This is an additional update to comprehensively address CVE-2020-1108.

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-10"/>
          <updated date="2020-06-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-1108" impact="important" public="20200512">CVE-2020-1108</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827643" id="1827643">CVE-2020-1108 dotnet: Denial of service via untrusted input</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.19-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202471001"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.19-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202471003"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.515-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202471005"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.515-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202471007"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202550" version="637">
      <metadata>
        <title>ALSA-2020:2550: libexif security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2550" ref_url="https://errata.almalinux.org/8/ALSA-2020-2550.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2550" ref_url="https://access.redhat.com/errata/RHSA-2020:2550" source="RHSA"/>
        <reference ref_id="CVE-2020-13112" ref_url="https://access.redhat.com/security/cve/CVE-2020-13112" source="CVE"/>
        <description>The libexif packages provide a library for extracting extra information from image files.

Security Fix(es):

* libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-15"/>
          <updated date="2020-06-15"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="(CWE-122|CWE-190)-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-13112" impact="moderate" public="20200516">CVE-2020-13112</cve>
          <bugzilla href="https://bugzilla.redhat.com/1840344" id="1840344">CVE-2020-13112 libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libexif is earlier than 0:0.6.21-17.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202550001"/>
              <criterion comment="libexif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libexif-devel is earlier than 0:0.6.21-17.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202550003"/>
              <criterion comment="libexif-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202567" version="636">
      <metadata>
        <title>ALSA-2020:2567: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2567" ref_url="https://errata.almalinux.org/8/ALSA-2020-2567.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2567" ref_url="https://access.redhat.com/errata/RHSA-2020:2567" source="RHSA"/>
        <reference ref_id="CVE-2020-12657" ref_url="https://access.redhat.com/security/cve/CVE-2020-12657" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

* kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-15"/>
          <updated date="2020-06-15"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12657" impact="important" public="20200505">CVE-2020-12657</cve>
          <bugzilla href="https://bugzilla.redhat.com/1832866" id="1832866">CVE-2020-12657 kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202125006"/>
                <criterion comment="kernel version 0:4.18.0-193.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202567007"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125001"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125003"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193 is earlier than 0:1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20202567004"/>
                    <criterion comment="kpatch-patch-4_18_0-193 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202125005"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202567012"/>
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20202567013"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567008"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567009"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is earlier than 0:1-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567010"/>
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202567011"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202614" version="637">
      <metadata>
        <title>ALSA-2020:2614: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2614" ref_url="https://errata.almalinux.org/8/ALSA-2020-2614.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2614" ref_url="https://access.redhat.com/errata/RHSA-2020:2614" source="RHSA"/>
        <reference ref_id="CVE-2020-12398" ref_url="https://access.redhat.com/security/cve/CVE-2020-12398" source="CVE"/>
        <reference ref_id="CVE-2020-12405" ref_url="https://access.redhat.com/security/cve/CVE-2020-12405" source="CVE"/>
        <reference ref_id="CVE-2020-12406" ref_url="https://access.redhat.com/security/cve/CVE-2020-12406" source="CVE"/>
        <reference ref_id="CVE-2020-12410" ref_url="https://access.redhat.com/security/cve/CVE-2020-12410" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.9.0.

Security Fix(es):

* Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage (CVE-2020-12398)

* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405)

* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406)

* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-22"/>
          <updated date="2020-06-22"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-12398" impact="important" public="20200602">CVE-2020-12398</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12405" impact="important" public="20200602">CVE-2020-12405</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-12406" impact="important" public="20200602">CVE-2020-12406</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12410" impact="important" public="20200602">CVE-2020-12410</cve>
          <bugzilla href="https://bugzilla.redhat.com/1843030" id="1843030">CVE-2020-12410 Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1843312" id="1843312">CVE-2020-12406 Mozilla: JavaScript Type confusion with NativeTypes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1843313" id="1843313">CVE-2020-12405 Mozilla: Use-after-free in SharedWorkerService</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846556" id="1846556">CVE-2020-12398 Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.9.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202614001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202637" version="635">
      <metadata>
        <title>ALSA-2020:2637: gnutls security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2637" ref_url="https://errata.almalinux.org/8/ALSA-2020-2637.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2637" ref_url="https://access.redhat.com/errata/RHSA-2020:2637" source="RHSA"/>
        <reference ref_id="CVE-2020-13777" ref_url="https://access.redhat.com/security/cve/CVE-2020-13777" source="CVE"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: session resumption works without master key allowing MITM (CVE-2020-13777)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-22"/>
          <updated date="2020-06-22"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-345" href="https://access.redhat.com/security/cve/CVE-2020-13777" impact="important" public="20200603">CVE-2020-13777</cve>
          <bugzilla href="https://bugzilla.redhat.com/1843723" id="1843723">CVE-2020-13777 gnutls: session resumption works without master key allowing MITM</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnutls is earlier than 0:3.6.8-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202637001"/>
              <criterion comment="gnutls is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-c++ is earlier than 0:3.6.8-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202637003"/>
              <criterion comment="gnutls-c++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-dane is earlier than 0:3.6.8-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202637005"/>
              <criterion comment="gnutls-dane is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-devel is earlier than 0:3.6.8-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202637007"/>
              <criterion comment="gnutls-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-utils is earlier than 0:3.6.8-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202637009"/>
              <criterion comment="gnutls-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202641" version="636">
      <metadata>
        <title>ALSA-2020:2641: grafana security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2641" ref_url="https://errata.almalinux.org/8/ALSA-2020-2641.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2641" ref_url="https://access.redhat.com/errata/RHSA-2020:2641" source="RHSA"/>
        <reference ref_id="CVE-2020-13379" ref_url="https://access.redhat.com/security/cve/CVE-2020-13379" source="CVE"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB. 

Security Fix(es):

* grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (CVE-2020-13379)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-22"/>
          <updated date="2020-06-22"/>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-918-&gt;CWE-284-&gt;CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-13379" impact="important" public="20200603">CVE-2020-13379</cve>
          <bugzilla href="https://bugzilla.redhat.com/1843640" id="1843640">CVE-2020-13379 grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="grafana is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641001"/>
              <criterion comment="grafana is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-azure-monitor is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641003"/>
              <criterion comment="grafana-azure-monitor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-cloudwatch is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641005"/>
              <criterion comment="grafana-cloudwatch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-elasticsearch is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641007"/>
              <criterion comment="grafana-elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-graphite is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641009"/>
              <criterion comment="grafana-graphite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-influxdb is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641011"/>
              <criterion comment="grafana-influxdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-loki is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641013"/>
              <criterion comment="grafana-loki is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mssql is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641015"/>
              <criterion comment="grafana-mssql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mysql is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641017"/>
              <criterion comment="grafana-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-opentsdb is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641019"/>
              <criterion comment="grafana-opentsdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-postgres is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641021"/>
              <criterion comment="grafana-postgres is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-prometheus is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641023"/>
              <criterion comment="grafana-prometheus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-stackdriver is earlier than 0:6.3.6-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202641025"/>
              <criterion comment="grafana-stackdriver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659026"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202755" version="634">
      <metadata>
        <title>ALSA-2020:2755: nghttp2 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2755" ref_url="https://errata.almalinux.org/8/ALSA-2020-2755.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2755" ref_url="https://access.redhat.com/errata/RHSA-2020:2755" source="RHSA"/>
        <reference ref_id="CVE-2020-11080" ref_url="https://access.redhat.com/security/cve/CVE-2020-11080" source="CVE"/>
        <description>libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.

Security Fix(es):

* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-25"/>
          <updated date="2020-06-25"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-11080" impact="important" public="20200602">CVE-2020-11080</cve>
          <bugzilla href="https://bugzilla.redhat.com/1844929" id="1844929">CVE-2020-11080 nghttp2: overly large SETTINGS frames can lead to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libnghttp2 is earlier than 0:1.33.0-3.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202755001"/>
              <criterion comment="libnghttp2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libnghttp2-devel is earlier than 0:1.33.0-3.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202755003"/>
              <criterion comment="libnghttp2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nghttp2 is earlier than 0:1.33.0-3.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202755005"/>
              <criterion comment="nghttp2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192692006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202774" version="638">
      <metadata>
        <title>ALSA-2020:2774: virt:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2774" ref_url="https://errata.almalinux.org/8/ALSA-2020-2774.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2774" ref_url="https://access.redhat.com/errata/RHSA-2020:2774" source="RHSA"/>
        <reference ref_id="CVE-2019-20382" ref_url="https://access.redhat.com/security/cve/CVE-2019-20382" source="CVE"/>
        <reference ref_id="CVE-2020-8608" ref_url="https://access.redhat.com/security/cve/CVE-2020-8608" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608)

* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-06-30"/>
          <updated date="2020-06-30"/>
          <cve cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-401-&gt;CWE-772" href="https://access.redhat.com/security/cve/CVE-2019-20382" impact="low" public="20190917">CVE-2019-20382</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-8608" impact="important" public="20200127">CVE-2020-8608</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798453" id="1798453">CVE-2020-8608 QEMU: Slirp: potential OOB access due to unsafe snprintf() usages</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1810390" id="1810390">CVE-2019-20382 QEMU: vnc: memory leakage upon disconnect</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20171214-6.gitfa98132.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450011"/>
                  <criterion comment="SLOF is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450031"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450051"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740071"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740091"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740111"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740131"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740151"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740171"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740231"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740251"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740271"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740331"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740351"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740371"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740391"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450411"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740431"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740511"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740531"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740551"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740571"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740591"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740611"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740631"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740651"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740671"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740691"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740711"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740731"/>
                  <criterion comment="libvirt-daemon-driver-qemu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740751"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740771"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740791"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740811"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740831"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740851"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740871"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740891"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740911"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740931"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740951"/>
                  <criterion comment="libvirt-daemon-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750982"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450971"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740991"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741011"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741031"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741051"/>
                  <criterion comment="libvirt-lock-sanlock is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741071"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741091"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451111"/>
                  <criterion comment="nbdkit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451131"/>
                  <criterion comment="nbdkit-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751162"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451151"/>
                  <criterion comment="nbdkit-basic-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451171"/>
                  <criterion comment="nbdkit-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451191"/>
                  <criterion comment="nbdkit-example-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451211"/>
                  <criterion comment="nbdkit-plugin-gzip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451231"/>
                  <criterion comment="nbdkit-plugin-python-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451251"/>
                  <criterion comment="nbdkit-plugin-python3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451271"/>
                  <criterion comment="nbdkit-plugin-vddk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751302"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451291"/>
                  <criterion comment="nbdkit-plugin-xz is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751322"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741371"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451391"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451411"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451431"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741451"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451471"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741491"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741511"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741531"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741551"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741571"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741591"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741611"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741631"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741651"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027741671"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451691"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741711"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451731"/>
                  <criterion comment="seabios is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451751"/>
                  <criterion comment="seabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751782"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451771"/>
                  <criterion comment="seavgabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751802"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451831"/>
                  <criterion comment="supermin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451851"/>
                  <criterion comment="supermin-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741871"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741891"/>
                  <criterion comment="virt-v2v is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751942"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451941"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451951"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451961"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741981"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741991"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742001"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742011"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742021"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742031"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742041"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742051"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742061"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742071"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742081"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742091"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742101"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742111"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742121"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742131"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742141"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742151"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742161"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742171"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452201"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742191"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742201"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742211"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742221"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452281"/>
                  <criterion comment="ocaml-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452292"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452301"/>
                  <criterion comment="ocaml-hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452312"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742301"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742321"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452361"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452371"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452381"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452391"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202027742381"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452421"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202828" version="636">
      <metadata>
        <title>ALSA-2020:2828: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2828" ref_url="https://errata.almalinux.org/8/ALSA-2020-2828.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2828" ref_url="https://access.redhat.com/errata/RHSA-2020:2828" source="RHSA"/>
        <reference ref_id="CVE-2020-12417" ref_url="https://access.redhat.com/security/cve/CVE-2020-12417" source="CVE"/>
        <reference ref_id="CVE-2020-12418" ref_url="https://access.redhat.com/security/cve/CVE-2020-12418" source="CVE"/>
        <reference ref_id="CVE-2020-12419" ref_url="https://access.redhat.com/security/cve/CVE-2020-12419" source="CVE"/>
        <reference ref_id="CVE-2020-12420" ref_url="https://access.redhat.com/security/cve/CVE-2020-12420" source="CVE"/>
        <reference ref_id="CVE-2020-12421" ref_url="https://access.redhat.com/security/cve/CVE-2020-12421" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.10.0 ESR.

Security Fix(es):

* Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417)

* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418)

* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419)

* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420)

* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-06"/>
          <updated date="2020-07-06"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-12417" impact="important" public="20200630">CVE-2020-12417</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-12418" impact="important" public="20200630">CVE-2020-12418</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12419" impact="important" public="20200630">CVE-2020-12419</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12420" impact="important" public="20200630">CVE-2020-12420</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-296" href="https://access.redhat.com/security/cve/CVE-2020-12421" impact="moderate" public="20200630">CVE-2020-12421</cve>
          <bugzilla href="https://bugzilla.redhat.com/1853014" id="1853014">CVE-2020-12417 Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853015" id="1853015">CVE-2020-12418 Mozilla: Information disclosure due to manipulated URL object</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853016" id="1853016">CVE-2020-12419 Mozilla: Use-after-free in nsGlobalWindowInner</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853017" id="1853017">CVE-2020-12420 Mozilla: Use-After-Free when trying to connect to a STUN server</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853018" id="1853018">CVE-2020-12421 Mozilla: Add-On updates did not respect the same certificate trust rules as software updates</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.10.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202828001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202848" version="636">
      <metadata>
        <title>ALSA-2020:2848: nodejs:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2848" ref_url="https://errata.almalinux.org/8/ALSA-2020-2848.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2848" ref_url="https://access.redhat.com/errata/RHSA-2020:2848" source="RHSA"/>
        <reference ref_id="CVE-2020-11080" ref_url="https://access.redhat.com/security/cve/CVE-2020-11080" source="CVE"/>
        <reference ref_id="CVE-2020-7598" ref_url="https://access.redhat.com/security/cve/CVE-2020-7598" source="CVE"/>
        <reference ref_id="CVE-2020-8174" ref_url="https://access.redhat.com/security/cve/CVE-2020-8174" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (10.21.0).

Security Fix(es):

* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)

* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)

* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-07"/>
          <updated date="2020-07-07"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-11080" impact="important" public="20200602">CVE-2020-11080</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-7598" impact="moderate" public="20200310">CVE-2020-7598</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8174" impact="moderate" public="20200602">CVE-2020-8174</cve>
          <bugzilla href="https://bugzilla.redhat.com/1813344" id="1813344">CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844929" id="1844929">CVE-2020-11080 nghttp2: overly large SETTINGS frames can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845256" id="1845256">CVE-2020-8174 nodejs: memory corruption in napi_get_value_string_* functions</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.21.0-3.module_el8.2.0+391+8da3adc6" test_ref="oval:org.almalinux.alsa:tst:202028480011"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.21.0-3.module_el8.2.0+391+8da3adc6" test_ref="oval:org.almalinux.alsa:tst:202028480031"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.21.0-3.module_el8.2.0+391+8da3adc6" test_ref="oval:org.almalinux.alsa:tst:202028480051"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:10.21.0-3.module_el8.2.0+391+8da3adc6" test_ref="oval:org.almalinux.alsa:tst:202028480071"/>
              <criterion comment="nodejs-full-i18n is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202028480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.4-1.10.21.0.3.module_el8.2.0+391+8da3adc6" test_ref="oval:org.almalinux.alsa:tst:202028480131"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202852" version="637">
      <metadata>
        <title>ALSA-2020:2852: nodejs:12 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2852" ref_url="https://errata.almalinux.org/8/ALSA-2020-2852.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2852" ref_url="https://access.redhat.com/errata/RHSA-2020:2852" source="RHSA"/>
        <reference ref_id="CVE-2020-11080" ref_url="https://access.redhat.com/security/cve/CVE-2020-11080" source="CVE"/>
        <reference ref_id="CVE-2020-7598" ref_url="https://access.redhat.com/security/cve/CVE-2020-7598" source="CVE"/>
        <reference ref_id="CVE-2020-8172" ref_url="https://access.redhat.com/security/cve/CVE-2020-8172" source="CVE"/>
        <reference ref_id="CVE-2020-8174" ref_url="https://access.redhat.com/security/cve/CVE-2020-8174" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (12.18.2).

Security Fix(es):

* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)

* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)

* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)

* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-07"/>
          <updated date="2020-07-07"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-11080" impact="important" public="20200602">CVE-2020-11080</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-7598" impact="moderate" public="20200310">CVE-2020-7598</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2020-8172" impact="moderate" public="20200602">CVE-2020-8172</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8174" impact="moderate" public="20200602">CVE-2020-8174</cve>
          <bugzilla href="https://bugzilla.redhat.com/1813344" id="1813344">CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844929" id="1844929">CVE-2020-11080 nghttp2: overly large SETTINGS frames can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845247" id="1845247">CVE-2020-8172 nodejs: TLS session reuse can lead to hostname verification bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845256" id="1845256">CVE-2020-8174 nodejs: memory corruption in napi_get_value_string_* functions</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:12.18.2-1.module+el8.2.0+7233+61d664c1" test_ref="oval:org.almalinux.alsa:tst:20202852001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:12.18.2-1.module+el8.2.0+7233+61d664c1" test_ref="oval:org.almalinux.alsa:tst:20202852003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:12.18.2-1.module+el8.2.0+7233+61d664c1" test_ref="oval:org.almalinux.alsa:tst:20202852005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
              <criterion comment="nodejs-full-i18n is earlier than 1:12.18.2-1.module+el8.2.0+7233+61d664c1" test_ref="oval:org.almalinux.alsa:tst:20202852007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1" test_ref="oval:org.almalinux.alsa:tst:20202852013"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202897" version="635">
      <metadata>
        <title>ALSA-2020:2897: jbig2dec security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2897" ref_url="https://errata.almalinux.org/8/ALSA-2020-2897.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2897" ref_url="https://access.redhat.com/errata/RHSA-2020:2897" source="RHSA"/>
        <reference ref_id="CVE-2020-12268" ref_url="https://access.redhat.com/security/cve/CVE-2020-12268" source="CVE"/>
        <description>jbig2dec is a decoder implementation of the JBIG2 image compression format. 

Security Fix(es):

* jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c (CVE-2020-12268)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-13"/>
          <updated date="2020-07-13"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-12268" impact="important" public="20200127">CVE-2020-12268</cve>
          <bugzilla href="https://bugzilla.redhat.com/1848518" id="1848518">CVE-2020-12268 jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="jbig2dec-libs is earlier than 0:0.14-4.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202897001"/>
          <criterion comment="jbig2dec-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202897002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202901" version="635">
      <metadata>
        <title>ALSA-2020:2901: dovecot security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2901" ref_url="https://errata.almalinux.org/8/ALSA-2020-2901.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2901" ref_url="https://access.redhat.com/errata/RHSA-2020:2901" source="RHSA"/>
        <reference ref_id="CVE-2020-10957" ref_url="https://access.redhat.com/security/cve/CVE-2020-10957" source="CVE"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: malformed NOOP commands leads to DoS (CVE-2020-10957)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-13"/>
          <updated date="2020-07-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-10957" impact="important" public="20200518">CVE-2020-10957</cve>
          <bugzilla href="https://bugzilla.redhat.com/1834317" id="1834317">CVE-2020-10957 dovecot: malformed NOOP commands leads to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dovecot is earlier than 1:2.3.8-2.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202901001"/>
              <criterion comment="dovecot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-devel is earlier than 1:2.3.8-2.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202901003"/>
              <criterion comment="dovecot-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-mysql is earlier than 1:2.3.8-2.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202901005"/>
              <criterion comment="dovecot-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pgsql is earlier than 1:2.3.8-2.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202901007"/>
              <criterion comment="dovecot-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pigeonhole is earlier than 1:2.3.8-2.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202901009"/>
              <criterion comment="dovecot-pigeonhole is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193467010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202902" version="635">
      <metadata>
        <title>ALSA-2020:2902: sane-backends security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2902" ref_url="https://errata.almalinux.org/8/ALSA-2020-2902.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2902" ref_url="https://access.redhat.com/errata/RHSA-2020:2902" source="RHSA"/>
        <reference ref_id="CVE-2020-12861" ref_url="https://access.redhat.com/security/cve/CVE-2020-12861" source="CVE"/>
        <reference ref_id="CVE-2020-12865" ref_url="https://access.redhat.com/security/cve/CVE-2020-12865" source="CVE"/>
        <description>Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers).

Security Fix(es):

* sane-backends: Heap buffer overflow in epsonds_net_read in epsonds-net.c (CVE-2020-12861)

* sane-backends: Heap buffer overflow in esci2_img (CVE-2020-12865)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-14"/>
          <updated date="2020-07-14"/>
          <cve cvss3="8.0/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-12861" impact="important" public="20200517">CVE-2020-12861</cve>
          <cve cvss3="8.0/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-12865" impact="important" public="20200517">CVE-2020-12865</cve>
          <bugzilla href="https://bugzilla.redhat.com/1850556" id="1850556">CVE-2020-12861 sane-backends: Heap buffer overflow in epsonds_net_read in epsonds-net.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1850598" id="1850598">CVE-2020-12865 sane-backends: Heap buffer overflow in esci2_img</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="sane-backends is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902001"/>
              <criterion comment="sane-backends is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-daemon is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902003"/>
              <criterion comment="sane-backends-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-devel is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902005"/>
              <criterion comment="sane-backends-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-doc is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902007"/>
              <criterion comment="sane-backends-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-drivers-cameras is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902009"/>
              <criterion comment="sane-backends-drivers-cameras is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-drivers-scanners is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902011"/>
              <criterion comment="sane-backends-drivers-scanners is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sane-backends-libs is earlier than 0:1.0.27-19.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20202902013"/>
              <criterion comment="sane-backends-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202902014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202938" version="638">
      <metadata>
        <title>ALSA-2020:2938: .NET Core security and bugfix update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2938" ref_url="https://errata.almalinux.org/8/ALSA-2020-2938.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2938" ref_url="https://access.redhat.com/errata/RHSA-2020:2938" source="RHSA"/>
        <reference ref_id="CVE-2020-1147" ref_url="https://access.redhat.com/security/cve/CVE-2020-1147" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

A new version of .NET Core that addresses a security vulnerability is now available. The updated version is .NET Core Runtime 2.1.20 and SDK 2.1.516.

Security Fix(es):

* .NT Core: XML source markup processing remote code execution (CVE-2020-1147)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-15"/>
          <updated date="2020-07-15"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-1147" impact="critical" public="20200714:1700">CVE-2020-1147</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856929" id="1856929">CVE-2020-1147 dotnet: XML source markup processing remote code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.20-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202938001"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.20-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202938003"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.516-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202938005"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.516-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202938007"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202954" version="637">
      <metadata>
        <title>ALSA-2020:2954: .NET Core 3.1 security and bugfix update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2954" ref_url="https://errata.almalinux.org/8/ALSA-2020-2954.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2954" ref_url="https://access.redhat.com/errata/RHSA-2020:2954" source="RHSA"/>
        <reference ref_id="CVE-2020-1147" ref_url="https://access.redhat.com/security/cve/CVE-2020-1147" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.106 and .NET Core Runtime 3.1.6.

* .NET Core: XML source markup processing remote code execution (CVE-2020-1147)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-15"/>
          <updated date="2020-07-15"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2020-1147" impact="critical" public="20200714:1700">CVE-2020-1147</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856929" id="1856929">CVE-2020-1147 dotnet: XML source markup processing remote code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.1.106-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954007"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954011"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954013"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.106-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954015"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.6-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954017"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.106-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954019"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.1.106-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202954021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202970" version="637">
      <metadata>
        <title>ALSA-2020:2970: java-11-openjdk security and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2970" ref_url="https://errata.almalinux.org/8/ALSA-2020-2970.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2970" ref_url="https://access.redhat.com/errata/RHSA-2020:2970" source="RHSA"/>
        <reference ref_id="CVE-2020-14556" ref_url="https://access.redhat.com/security/cve/CVE-2020-14556" source="CVE"/>
        <reference ref_id="CVE-2020-14562" ref_url="https://access.redhat.com/security/cve/CVE-2020-14562" source="CVE"/>
        <reference ref_id="CVE-2020-14573" ref_url="https://access.redhat.com/security/cve/CVE-2020-14573" source="CVE"/>
        <reference ref_id="CVE-2020-14577" ref_url="https://access.redhat.com/security/cve/CVE-2020-14577" source="CVE"/>
        <reference ref_id="CVE-2020-14583" ref_url="https://access.redhat.com/security/cve/CVE-2020-14583" source="CVE"/>
        <reference ref_id="CVE-2020-14593" ref_url="https://access.redhat.com/security/cve/CVE-2020-14593" source="CVE"/>
        <reference ref_id="CVE-2020-14621" ref_url="https://access.redhat.com/security/cve/CVE-2020-14621" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)

* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)

* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)

* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562)

* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573)

* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)

* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Enhancement(s):

* Add -static-libs subpackage with statically linked OpenJDK libraries (BZ#1848701)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-16"/>
          <updated date="2020-07-16"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14556" impact="moderate" public="20200714">CVE-2020-14556</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-14562" impact="moderate" public="20200714">CVE-2020-14562</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14573" impact="moderate" public="20200714">CVE-2020-14573</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14577" impact="low" public="20200714">CVE-2020-14577</cve>
          <cve cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14583" impact="important" public="20200714">CVE-2020-14583</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14593" impact="important" public="20200714">CVE-2020-14593</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14621" impact="moderate" public="20200714">CVE-2020-14621</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856448" id="1856448">CVE-2020-14583 OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856784" id="1856784">CVE-2020-14593 OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856810" id="1856810">CVE-2020-14562 OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856885" id="1856885">CVE-2020-14621 OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856896" id="1856896">CVE-2020-14556 OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856951" id="1856951">CVE-2020-14573 OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856988" id="1856988">CVE-2020-14577 OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-static-libs is earlier than 1:11.0.8.10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202970017"/>
              <criterion comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202970018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20202972" version="635">
      <metadata>
        <title>ALSA-2020:2972: java-1.8.0-openjdk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:2972" ref_url="https://errata.almalinux.org/8/ALSA-2020-2972.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:2972" ref_url="https://access.redhat.com/errata/RHSA-2020:2972" source="RHSA"/>
        <reference ref_id="CVE-2020-14556" ref_url="https://access.redhat.com/security/cve/CVE-2020-14556" source="CVE"/>
        <reference ref_id="CVE-2020-14577" ref_url="https://access.redhat.com/security/cve/CVE-2020-14577" source="CVE"/>
        <reference ref_id="CVE-2020-14578" ref_url="https://access.redhat.com/security/cve/CVE-2020-14578" source="CVE"/>
        <reference ref_id="CVE-2020-14579" ref_url="https://access.redhat.com/security/cve/CVE-2020-14579" source="CVE"/>
        <reference ref_id="CVE-2020-14583" ref_url="https://access.redhat.com/security/cve/CVE-2020-14583" source="CVE"/>
        <reference ref_id="CVE-2020-14593" ref_url="https://access.redhat.com/security/cve/CVE-2020-14593" source="CVE"/>
        <reference ref_id="CVE-2020-14621" ref_url="https://access.redhat.com/security/cve/CVE-2020-14621" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)

* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)

* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)

* OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578)

* OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579)

* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)

* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-16"/>
          <updated date="2020-07-16"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14556" impact="moderate" public="20200714">CVE-2020-14556</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14577" impact="low" public="20200714">CVE-2020-14577</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-14578" impact="moderate" public="20200714">CVE-2020-14578</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-14579" impact="moderate" public="20200714">CVE-2020-14579</cve>
          <cve cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14583" impact="important" public="20200714">CVE-2020-14583</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14593" impact="important" public="20200714">CVE-2020-14593</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14621" impact="moderate" public="20200714">CVE-2020-14621</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856448" id="1856448">CVE-2020-14583 OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856784" id="1856784">CVE-2020-14593 OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856885" id="1856885">CVE-2020-14621 OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856896" id="1856896">CVE-2020-14556 OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856988" id="1856988">CVE-2020-14577 OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856991" id="1856991">CVE-2020-14578 OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856995" id="1856995">CVE-2020-14579 OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.262.b10-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202972015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203010" version="641">
      <metadata>
        <title>ALSA-2020:3010: kernel security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3010" ref_url="https://errata.almalinux.org/8/ALSA-2020-3010.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3010" ref_url="https://access.redhat.com/errata/RHSA-2020:3010" source="RHSA"/>
        <reference ref_id="CVE-2019-19807" ref_url="https://access.redhat.com/security/cve/CVE-2019-19807" source="CVE"/>
        <reference ref_id="CVE-2019-3016" ref_url="https://access.redhat.com/security/cve/CVE-2019-3016" source="CVE"/>
        <reference ref_id="CVE-2020-10757" ref_url="https://access.redhat.com/security/cve/CVE-2020-10757" source="CVE"/>
        <reference ref_id="CVE-2020-10766" ref_url="https://access.redhat.com/security/cve/CVE-2020-10766" source="CVE"/>
        <reference ref_id="CVE-2020-10767" ref_url="https://access.redhat.com/security/cve/CVE-2020-10767" source="CVE"/>
        <reference ref_id="CVE-2020-10768" ref_url="https://access.redhat.com/security/cve/CVE-2020-10768" source="CVE"/>
        <reference ref_id="CVE-2020-12653" ref_url="https://access.redhat.com/security/cve/CVE-2020-12653" source="CVE"/>
        <reference ref_id="CVE-2020-12654" ref_url="https://access.redhat.com/security/cve/CVE-2020-12654" source="CVE"/>
        <reference ref_id="CVE-2020-12888" ref_url="https://access.redhat.com/security/cve/CVE-2020-12888" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)

* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821378)

* [FJ8.0 Bug]: System hungs up after setting parameters for hugepages (BZ#1835789)

* RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836229)

* "[sig-network] Services should be rejected when no endpoints exist" test fails frequently on RHEL8 nodes (BZ#1836302)

* RHEL8.2 Beta - RHEL8.2 reports EEH errors on internal SAS adapter during HTX run on PMEM (SCM/pmem) (BZ#1842406)

* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1842620)

* deadlock between modprobe and netns exit (BZ#1845164)

* exit_boot failed when install RHEL8.1 (BZ#1846180)

* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847128)

* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847453)

* WARNING: CPU: 1 PID: 0 at arch/x86/kernel/apic/vector.c:846 free_moved_vector+0x141/0x150 (BZ#1848545)

* Backport conntrack race condition fixes (BZ#1851003)

* nf_conntrack module unload fail and refcount become to negative (BZ#1851005)

* OVS: backport performance patches from upstream to 8.2z (BZ#1851235)

* RHEL8.3: backport "smp: Allow smp_call_function_single_async() to insert locked csd" (BZ#1851406)

* [DELL EMC 8.2 BUG] NVMe drive is not detected after multiple hotplug (hot add + surprise remove) operations (BZ#1852045)

Enhancement(s):

* [Mellanox 8.3 FEAT] mlx5: drivers update upto Linux v5.5 (BZ#1843544)

* [IBM 8.3 FEAT] Update nvme driver to latest level for POWER (BZ#1846405)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19807" impact="important" public="20191106">CVE-2019-19807</cve>
          <cve cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-362-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3016" impact="low" public="20200130:1800">CVE-2019-3016</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-10757" impact="important" public="20200604:0900">CVE-2020-10757</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10766" impact="important" public="20200609:1700">CVE-2020-10766</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10767" impact="important" public="20200609:1400">CVE-2020-10767</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10768" impact="important" public="20200609:1400">CVE-2020-10768</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12653" impact="important" public="20200127">CVE-2020-12653</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-12654" impact="important" public="20200127">CVE-2020-12654</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-12888" impact="important" public="20200514">CVE-2020-12888</cve>
          <bugzilla href="https://bugzilla.redhat.com/1786078" id="1786078">CVE-2019-19807 kernel: use-after-free in sound/core/timer.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1792167" id="1792167">CVE-2019-3016 kernel: kvm: Information leak within a KVM guest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831868" id="1831868">CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832530" id="1832530">CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836244" id="1836244">CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1842525" id="1842525">CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845840" id="1845840">CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845867" id="1845867">CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845868" id="1845868">CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.13.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203010051"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.13.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203010052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203010049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203011" version="638">
      <metadata>
        <title>ALSA-2020:3011: NetworkManager security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3011" ref_url="https://errata.almalinux.org/8/ALSA-2020-3011.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3011" ref_url="https://access.redhat.com/errata/RHSA-2020:3011" source="RHSA"/>
        <reference ref_id="CVE-2020-10754" ref_url="https://access.redhat.com/security/cve/CVE-2020-10754" source="CVE"/>
        <description>NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.

Security Fix(es):

* NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults (CVE-2020-10754)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* NetworkManager doesn't reconnect after DHCP failure (BZ#1843357)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-287-&gt;CWE-306" href="https://access.redhat.com/security/cve/CVE-2020-10754" impact="moderate" public="20200529:0441">CVE-2020-10754</cve>
          <bugzilla href="https://bugzilla.redhat.com/1841041" id="1841041">CVE-2020-10754 NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="NetworkManager is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011001"/>
              <criterion comment="NetworkManager is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-adsl is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011003"/>
              <criterion comment="NetworkManager-adsl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-bluetooth is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011005"/>
              <criterion comment="NetworkManager-bluetooth is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-cloud-setup is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011007"/>
              <criterion comment="NetworkManager-cloud-setup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-config-connectivity-redhat is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011009"/>
              <criterion comment="NetworkManager-config-connectivity-redhat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-config-server is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011011"/>
              <criterion comment="NetworkManager-config-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-dispatcher-routing-rules is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011013"/>
              <criterion comment="NetworkManager-dispatcher-routing-rules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-libnm is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011015"/>
              <criterion comment="NetworkManager-libnm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-libnm-devel is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011017"/>
              <criterion comment="NetworkManager-libnm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-ovs is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011019"/>
              <criterion comment="NetworkManager-ovs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-ppp is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011021"/>
              <criterion comment="NetworkManager-ppp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-team is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011023"/>
              <criterion comment="NetworkManager-team is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-tui is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011025"/>
              <criterion comment="NetworkManager-tui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-wifi is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011027"/>
              <criterion comment="NetworkManager-wifi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="NetworkManager-wwan is earlier than 1:1.22.8-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203011029"/>
              <criterion comment="NetworkManager-wwan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203011030"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203014" version="635">
      <metadata>
        <title>ALSA-2020:3014: dbus security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3014" ref_url="https://errata.almalinux.org/8/ALSA-2020-3014.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3014" ref_url="https://access.redhat.com/errata/RHSA-2020:3014" source="RHSA"/>
        <reference ref_id="CVE-2020-12049" ref_url="https://access.redhat.com/security/cve/CVE-2020-12049" source="CVE"/>
        <description>D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

* dbus: denial of service via file descriptor leak (CVE-2020-12049)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-12049" impact="important" public="20200604">CVE-2020-12049</cve>
          <bugzilla href="https://bugzilla.redhat.com/1849041" id="1849041">CVE-2020-12049 dbus: denial of service via file descriptor leak</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dbus is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014001"/>
              <criterion comment="dbus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-common is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014003"/>
              <criterion comment="dbus-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-daemon is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014005"/>
              <criterion comment="dbus-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-devel is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014007"/>
              <criterion comment="dbus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-libs is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014009"/>
              <criterion comment="dbus-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-tools is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014011"/>
              <criterion comment="dbus-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dbus-x11 is earlier than 1:1.12.8-10.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203014013"/>
              <criterion comment="dbus-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193707014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203016" version="639">
      <metadata>
        <title>ALSA-2020:3016: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3016" ref_url="https://errata.almalinux.org/8/ALSA-2020-3016.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3016" ref_url="https://access.redhat.com/errata/RHSA-2020:3016" source="RHSA"/>
        <reference ref_id="CVE-2019-19807" ref_url="https://access.redhat.com/security/cve/CVE-2019-19807" source="CVE"/>
        <reference ref_id="CVE-2019-3016" ref_url="https://access.redhat.com/security/cve/CVE-2019-3016" source="CVE"/>
        <reference ref_id="CVE-2020-10757" ref_url="https://access.redhat.com/security/cve/CVE-2020-10757" source="CVE"/>
        <reference ref_id="CVE-2020-10766" ref_url="https://access.redhat.com/security/cve/CVE-2020-10766" source="CVE"/>
        <reference ref_id="CVE-2020-10767" ref_url="https://access.redhat.com/security/cve/CVE-2020-10767" source="CVE"/>
        <reference ref_id="CVE-2020-10768" ref_url="https://access.redhat.com/security/cve/CVE-2020-10768" source="CVE"/>
        <reference ref_id="CVE-2020-12653" ref_url="https://access.redhat.com/security/cve/CVE-2020-12653" source="CVE"/>
        <reference ref_id="CVE-2020-12654" ref_url="https://access.redhat.com/security/cve/CVE-2020-12654" source="CVE"/>
        <reference ref_id="CVE-2020-12888" ref_url="https://access.redhat.com/security/cve/CVE-2020-12888" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)

* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)

* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19807" impact="important" public="20191106">CVE-2019-19807</cve>
          <cve cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-362-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-3016" impact="low" public="20200130:1800">CVE-2019-3016</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-10757" impact="important" public="20200604:0900">CVE-2020-10757</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10766" impact="important" public="20200609:1700">CVE-2020-10766</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10767" impact="important" public="20200609:1400">CVE-2020-10767</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10768" impact="important" public="20200609:1400">CVE-2020-10768</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12653" impact="important" public="20200127">CVE-2020-12653</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-12654" impact="important" public="20200127">CVE-2020-12654</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-12888" impact="important" public="20200514">CVE-2020-12888</cve>
          <bugzilla href="https://bugzilla.redhat.com/1786078" id="1786078">CVE-2019-19807 kernel: use-after-free in sound/core/timer.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1792167" id="1792167">CVE-2019-3016 kernel: kvm: Information leak within a KVM guest</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831868" id="1831868">CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832530" id="1832530">CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836244" id="1836244">CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1842525" id="1842525">CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845840" id="1845840">CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845867" id="1845867">CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845868" id="1845868">CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.13.2.rt13.65.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203010051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.13.2.rt13.65.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203016026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.13.2.rt13.65.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203016023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203032" version="639">
      <metadata>
        <title>ALSA-2020:3032: mod_auth_openidc:2.3 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3032" ref_url="https://errata.almalinux.org/8/ALSA-2020-3032.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3032" ref_url="https://access.redhat.com/errata/RHSA-2020:3032" source="RHSA"/>
        <reference ref_id="CVE-2019-14857" ref_url="https://access.redhat.com/security/cve/CVE-2019-14857" source="CVE"/>
        <reference ref_id="CVE-2019-20479" ref_url="https://access.redhat.com/security/cve/CVE-2019-20479" source="CVE"/>
        <description>The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. 

Security Fix(es):

* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857)

* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2019-14857" impact="moderate" public="20191002">CVE-2019-14857</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2019-20479" impact="moderate" public="20191112">CVE-2019-20479</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760613" id="1760613">CVE-2019-14857 mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1805102" id="1805102">CVE-2019-20479 mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module mod_auth_openidc:2.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20203032007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cjose is earlier than 0:0.6.1-2.module_el8.3.0+2087+ac02cfd2" test_ref="oval:org.almalinux.alsa:tst:202030320011"/>
              <criterion comment="cjose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cjose is earlier than 0:0.6.1-2.module_el8.4.0+2218+f2438af7" test_ref="oval:org.almalinux.alsa:tst:202030320012"/>
              <criterion comment="cjose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cjose is earlier than 0:0.6.1-2.module_el8.5.0+32+0dbd0c97" test_ref="oval:org.almalinux.alsa:tst:202030320013"/>
              <criterion comment="cjose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cjose-devel is earlier than 0:0.6.1-2.module_el8.3.0+2087+ac02cfd2" test_ref="oval:org.almalinux.alsa:tst:202030320031"/>
              <criterion comment="cjose-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cjose-devel is earlier than 0:0.6.1-2.module_el8.4.0+2218+f2438af7" test_ref="oval:org.almalinux.alsa:tst:202030320032"/>
              <criterion comment="cjose-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cjose-devel is earlier than 0:0.6.1-2.module_el8.5.0+32+0dbd0c97" test_ref="oval:org.almalinux.alsa:tst:202030320033"/>
              <criterion comment="cjose-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_auth_openidc is earlier than 0:2.3.7-4.module_el8.3.0+2087+ac02cfd2.3" test_ref="oval:org.almalinux.alsa:tst:202030320051"/>
              <criterion comment="mod_auth_openidc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203032006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_auth_openidc is earlier than 0:2.3.7-4.module_el8.2.0+463+d53af530.3" test_ref="oval:org.almalinux.alsa:tst:202030320052"/>
              <criterion comment="mod_auth_openidc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202030320062"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203038" version="636">
      <metadata>
        <title>ALSA-2020:3038: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3038" ref_url="https://errata.almalinux.org/8/ALSA-2020-3038.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3038" ref_url="https://access.redhat.com/errata/RHSA-2020:3038" source="RHSA"/>
        <reference ref_id="CVE-2020-12417" ref_url="https://access.redhat.com/security/cve/CVE-2020-12417" source="CVE"/>
        <reference ref_id="CVE-2020-12418" ref_url="https://access.redhat.com/security/cve/CVE-2020-12418" source="CVE"/>
        <reference ref_id="CVE-2020-12419" ref_url="https://access.redhat.com/security/cve/CVE-2020-12419" source="CVE"/>
        <reference ref_id="CVE-2020-12420" ref_url="https://access.redhat.com/security/cve/CVE-2020-12420" source="CVE"/>
        <reference ref_id="CVE-2020-12421" ref_url="https://access.redhat.com/security/cve/CVE-2020-12421" source="CVE"/>
        <reference ref_id="CVE-2020-15646" ref_url="https://access.redhat.com/security/cve/CVE-2020-15646" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.10.0.

Security Fix(es):

* Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417)

* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418)

* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419)

* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420)

* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-12417" impact="important" public="20200630">CVE-2020-12417</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-12418" impact="important" public="20200630">CVE-2020-12418</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12419" impact="important" public="20200630">CVE-2020-12419</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12420" impact="important" public="20200630">CVE-2020-12420</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-296" href="https://access.redhat.com/security/cve/CVE-2020-12421" impact="moderate" public="20200630">CVE-2020-12421</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-15646" impact="important" public="20200630">CVE-2020-15646</cve>
          <bugzilla href="https://bugzilla.redhat.com/1853014" id="1853014">CVE-2020-12417 Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853015" id="1853015">CVE-2020-12418 Mozilla: Information disclosure due to manipulated URL object</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853016" id="1853016">CVE-2020-12419 Mozilla: Use-after-free in nsGlobalWindowInner</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853017" id="1853017">CVE-2020-12420 Mozilla: Use-After-Free when trying to connect to a STUN server</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853018" id="1853018">CVE-2020-12421 Mozilla: Add-On updates did not respect the same certificate trust rules as software updates</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1854036" id="1854036">CVE-2020-15646 Mozilla: Automatic account setup leaks Microsoft Exchange login credentials</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.10.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203038001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203050" version="639">
      <metadata>
        <title>ALSA-2020:3050: cloud-init security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3050" ref_url="https://errata.almalinux.org/8/ALSA-2020-3050.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3050" ref_url="https://access.redhat.com/errata/RHSA-2020:3050" source="RHSA"/>
        <reference ref_id="CVE-2018-10896" ref_url="https://access.redhat.com/security/cve/CVE-2018-10896" source="CVE"/>
        <description>The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.

The following packages have been upgraded to a later upstream version: cloud-init (19.4). (BZ#1811912)

Security Fix(es):

* cloud-init: default configuration disabled deletion of SSH host keys (CVE-2018-10896)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="4.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-321" href="https://access.redhat.com/security/cve/CVE-2018-10896" impact="low" public="20180706">CVE-2018-10896</cve>
          <bugzilla href="https://bugzilla.redhat.com/1598831" id="1598831">CVE-2018-10896 cloud-init: default configuration disabled deletion of SSH host keys</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="cloud-init is earlier than 0:19.4-1.el8.7" test_ref="oval:org.almalinux.alsa:tst:20203050001"/>
          <criterion comment="cloud-init is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20191992002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203053" version="637">
      <metadata>
        <title>ALSA-2020:3053: container-tools:rhel8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3053" ref_url="https://errata.almalinux.org/8/ALSA-2020-3053.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3053" ref_url="https://access.redhat.com/errata/RHSA-2020:3053" source="RHSA"/>
        <reference ref_id="CVE-2020-1983" ref_url="https://access.redhat.com/security/cve/CVE-2020-1983" source="CVE"/>
        <reference ref_id="CVE-2021-20188" ref_url="https://access.redhat.com/security/cve/CVE-2021-20188" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-1983" impact="moderate" public="20200402">CVE-2020-1983</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2021-20188" impact="important" public="20210210">CVE-2021-20188</cve>
          <bugzilla href="https://bugzilla.redhat.com/1829825" id="1829825">CVE-2020-1983 QEMU: slirp: use-after-free in ip_reass() function in ip_input.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1915734" id="1915734">CVE-2021-20188 podman: container users permissions are not respected in privileged containers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.14.9-1.module+el8.2.1+6689+748e6520" test_ref="oval:org.almalinux.alsa:tst:20203053001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.14.9-1.module+el8.2.1+6689+748e6520" test_ref="oval:org.almalinux.alsa:tst:20203053003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="cockpit-podman is earlier than 0:17-1.module+el8.2.1+6636+bf4db4ab" test_ref="oval:org.almalinux.alsa:tst:20203053005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348008"/>
              <criterion comment="conmon is earlier than 2:2.0.17-1.module+el8.2.1+6771+3533eb4c" test_ref="oval:org.almalinux.alsa:tst:20203053007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="container-selinux is earlier than 2:2.135.0-1.module+el8.2.1+6849+893e4f4a" test_ref="oval:org.almalinux.alsa:tst:20203053009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.6-1.module+el8.2.1+6626+598993b4" test_ref="oval:org.almalinux.alsa:tst:20203053011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:1.0.0-1.module+el8.2.1+6676+604e1b26" test_ref="oval:org.almalinux.alsa:tst:20203053013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
              <criterion comment="crit is earlier than 0:3.14-2.module+el8.2.1+6750+e53a300c" test_ref="oval:org.almalinux.alsa:tst:20203053015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
              <criterion comment="criu is earlier than 0:3.14-2.module+el8.2.1+6750+e53a300c" test_ref="oval:org.almalinux.alsa:tst:20203053017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
              <criterion comment="fuse-overlayfs is earlier than 0:1.0.0-2.module+el8.2.1+6465+1a51e8b6" test_ref="oval:org.almalinux.alsa:tst:20203053019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053022"/>
              <criterion comment="libslirp is earlier than 0:4.3.0-3.module+el8.2.1+6816+bedf4f91" test_ref="oval:org.almalinux.alsa:tst:20203053021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053024"/>
              <criterion comment="libslirp-devel is earlier than 0:4.3.0-3.module+el8.2.1+6816+bedf4f91" test_ref="oval:org.almalinux.alsa:tst:20203053023"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:1.9.3-2.module+el8.2.1+6867+366c07d6" test_ref="oval:org.almalinux.alsa:tst:20203053025"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:1.9.3-2.module+el8.2.1+6867+366c07d6" test_ref="oval:org.almalinux.alsa:tst:20203053027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:1.9.3-2.module+el8.2.1+6867+366c07d6" test_ref="oval:org.almalinux.alsa:tst:20203053029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:1.9.3-2.module+el8.2.1+6867+366c07d6" test_ref="oval:org.almalinux.alsa:tst:20203053031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202030530331"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202030530332"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
              <criterion comment="python3-criu is earlier than 0:3.14-2.module+el8.2.1+6750+e53a300c" test_ref="oval:org.almalinux.alsa:tst:20203053035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
              <criterion comment="runc is earlier than 0:1.0.0-66.rc10.module+el8.2.1+6465+1a51e8b6" test_ref="oval:org.almalinux.alsa:tst:20203053037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:1.0.0-1.module+el8.2.1+6676+604e1b26" test_ref="oval:org.almalinux.alsa:tst:20203053039"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
              <criterion comment="skopeo-tests is earlier than 1:1.0.0-1.module+el8.2.1+6676+604e1b26" test_ref="oval:org.almalinux.alsa:tst:20203053041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:1.0.1-1.module+el8.2.1+6595+03641d72" test_ref="oval:org.almalinux.alsa:tst:20203053043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202030530451"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.2.0+305+5e198a41" test_ref="oval:org.almalinux.alsa:tst:202030530471"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203073" version="636">
      <metadata>
        <title>ALSA-2020:3073: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3073" ref_url="https://errata.almalinux.org/8/ALSA-2020-3073.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3073" ref_url="https://access.redhat.com/errata/RHSA-2020:3073" source="RHSA"/>
        <reference ref_id="CVE-2020-10766" ref_url="https://access.redhat.com/security/cve/CVE-2020-10766" source="CVE"/>
        <reference ref_id="CVE-2020-10767" ref_url="https://access.redhat.com/security/cve/CVE-2020-10767" source="CVE"/>
        <reference ref_id="CVE-2020-10768" ref_url="https://access.redhat.com/security/cve/CVE-2020-10768" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)

* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-21"/>
          <updated date="2020-07-21"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10766" impact="important" public="20200609:1700">CVE-2020-10766</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10767" impact="important" public="20200609:1400">CVE-2020-10767</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-10768" impact="important" public="20200609:1400">CVE-2020-10768</cve>
          <bugzilla href="https://bugzilla.redhat.com/1845840" id="1845840">CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845867" id="1845867">CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1845868" id="1845868">CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202125006"/>
                <criterion comment="kernel version 0:4.18.0-193.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203073007"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20203073001"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125003"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193 is earlier than 0:1-5.el8" test_ref="oval:org.almalinux.alsa:tst:20203073004"/>
                    <criterion comment="kpatch-patch-4_18_0-193 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202125005"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202567012"/>
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203073013"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073008"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567009"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is earlier than 0:1-3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073010"/>
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202567011"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.6.3.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203073018"/>
                <criterion comment="kernel version 0:4.18.0-193.6.3.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203073019"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073014"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073015"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_6_3 is earlier than 0:1-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073016"/>
                    <criterion comment="kpatch-patch-4_18_0-193_6_3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203073017"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203176" version="636">
      <metadata>
        <title>ALSA-2020:3176: postgresql-jdbc security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3176" ref_url="https://errata.almalinux.org/8/ALSA-2020-3176.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3176" ref_url="https://access.redhat.com/errata/RHSA-2020:3176" source="RHSA"/>
        <reference ref_id="CVE-2020-13692" ref_url="https://access.redhat.com/security/cve/CVE-2020-13692" source="CVE"/>
        <description>PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database.

Security Fix(es):

* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692)

This update introduces a backwards incompatible change required to resolve this issue. Refer to the Red Hat Knowledgebase article 5266441 linked to in the References section for information on how to re-enable the old insecure behavior.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-28"/>
          <updated date="2020-07-28"/>
          <cve cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" cwe="CWE-611" href="https://access.redhat.com/security/cve/CVE-2020-13692" impact="important" public="20200604">CVE-2020-13692</cve>
          <bugzilla href="https://bugzilla.redhat.com/1852985" id="1852985">CVE-2020-13692 postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="postgresql-jdbc is earlier than 0:42.2.3-3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203176001"/>
              <criterion comment="postgresql-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203176002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-jdbc-javadoc is earlier than 0:42.2.3-3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203176003"/>
              <criterion comment="postgresql-jdbc-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203176004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203185" version="635">
      <metadata>
        <title>ALSA-2020:3185: python-pillow security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3185" ref_url="https://errata.almalinux.org/8/ALSA-2020-3185.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3185" ref_url="https://access.redhat.com/errata/RHSA-2020:3185" source="RHSA"/>
        <reference ref_id="CVE-2020-11538" ref_url="https://access.redhat.com/security/cve/CVE-2020-11538" source="CVE"/>
        <reference ref_id="CVE-2020-5313" ref_url="https://access.redhat.com/security/cve/CVE-2020-5313" source="CVE"/>
        <description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.

Security Fix(es):

* python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 (CVE-2020-11538)

* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-28"/>
          <updated date="2020-07-28"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-11538" impact="important" public="20200701">CVE-2020-11538</cve>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-5313" impact="moderate" public="20200103">CVE-2020-5313</cve>
          <bugzilla href="https://bugzilla.redhat.com/1789532" id="1789532">CVE-2020-5313 python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852814" id="1852814">CVE-2020-11538 python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="python3-pillow is earlier than 0:5.1.1-12.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203185001"/>
          <criterion comment="python3-pillow is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200580002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203216" version="640">
      <metadata>
        <title>ALSA-2020:3216: grub2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3216" ref_url="https://errata.almalinux.org/8/ALSA-2020-3216.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3216" ref_url="https://access.redhat.com/errata/RHSA-2020:3216" source="RHSA"/>
        <reference ref_id="CVE-2020-10713" ref_url="https://access.redhat.com/security/cve/CVE-2020-10713" source="CVE"/>
        <reference ref_id="CVE-2020-14308" ref_url="https://access.redhat.com/security/cve/CVE-2020-14308" source="CVE"/>
        <reference ref_id="CVE-2020-14309" ref_url="https://access.redhat.com/security/cve/CVE-2020-14309" source="CVE"/>
        <reference ref_id="CVE-2020-14310" ref_url="https://access.redhat.com/security/cve/CVE-2020-14310" source="CVE"/>
        <reference ref_id="CVE-2020-14311" ref_url="https://access.redhat.com/security/cve/CVE-2020-14311" source="CVE"/>
        <reference ref_id="CVE-2020-15705" ref_url="https://access.redhat.com/security/cve/CVE-2020-15705" source="CVE"/>
        <reference ref_id="CVE-2020-15706" ref_url="https://access.redhat.com/security/cve/CVE-2020-15706" source="CVE"/>
        <reference ref_id="CVE-2020-15707" ref_url="https://access.redhat.com/security/cve/CVE-2020-15707" source="CVE"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.

The fwupd packages provide a service that allows session software to update device firmware.

Security Fix(es):

* grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713)

* grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308)

* grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309)

* grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310)

* grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311)

* grub2: Fail kernel validation without shim protocol (CVE-2020-15705)

* grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706)

* grub2: Integer overflow in initrd size handling (CVE-2020-15707)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-29"/>
          <updated date="2020-07-29"/>
          <cve cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-787-&gt;CWE-78" href="https://access.redhat.com/security/cve/CVE-2020-10713" impact="moderate" public="20200729:1700">CVE-2020-10713</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-14308" impact="moderate" public="20200729:1700">CVE-2020-14308</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-14309" impact="moderate" public="20200729:1700">CVE-2020-14309</cve>
          <cve cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-14310" impact="moderate" public="20200729:1700">CVE-2020-14310</cve>
          <cve cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-14311" impact="moderate" public="20200729:1700">CVE-2020-14311</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-440" href="https://access.redhat.com/security/cve/CVE-2020-15705" impact="moderate" public="20200729:1700">CVE-2020-15705</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-15706" impact="moderate" public="20200729:1700">CVE-2020-15706</cve>
          <cve cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-15707" impact="moderate" public="20200729:1700">CVE-2020-15707</cve>
          <bugzilla href="https://bugzilla.redhat.com/1825243" id="1825243">CVE-2020-10713 grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852009" id="1852009">CVE-2020-14308 grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852014" id="1852014">CVE-2020-14311 grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852022" id="1852022">CVE-2020-14309 grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852030" id="1852030">CVE-2020-14310 grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1860978" id="1860978">CVE-2020-15705 grub2: Fail kernel validation without shim protocol</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861118" id="1861118">CVE-2020-15706 grub2: Use-after-free redefining a function whilst the same function is already executing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861581" id="1861581">CVE-2020-15707 grub2: Integer overflow in initrd size handling</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="shim-unsigned-x64 is earlier than 0:15-7.el8" test_ref="oval:org.almalinux.alsa:tst:20203216001"/>
              <criterion comment="shim-unsigned-x64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="shim-aa64 is earlier than 0:15-14.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216003"/>
              <criterion comment="shim-aa64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="shim-ia32 is earlier than 0:15-14.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216005"/>
              <criterion comment="shim-ia32 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="shim-x64 is earlier than 0:15-14.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216007"/>
              <criterion comment="shim-x64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fwupd is earlier than 0:1.1.4-7.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216009"/>
              <criterion comment="fwupd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-common is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216011"/>
              <criterion comment="grub2-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64 is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216013"/>
              <criterion comment="grub2-efi-aa64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-cdboot is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216015"/>
              <criterion comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-modules is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216017"/>
              <criterion comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32 is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216019"/>
              <criterion comment="grub2-efi-ia32 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-cdboot is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216021"/>
              <criterion comment="grub2-efi-ia32-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-modules is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216023"/>
              <criterion comment="grub2-efi-ia32-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64 is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216025"/>
              <criterion comment="grub2-efi-x64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-cdboot is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216027"/>
              <criterion comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-modules is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216029"/>
              <criterion comment="grub2-efi-x64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216031"/>
              <criterion comment="grub2-pc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc-modules is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216033"/>
              <criterion comment="grub2-pc-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216035"/>
              <criterion comment="grub2-ppc64le is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le-modules is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216037"/>
              <criterion comment="grub2-ppc64le-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216039"/>
              <criterion comment="grub2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-efi is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216041"/>
              <criterion comment="grub2-tools-efi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-extra is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216043"/>
              <criterion comment="grub2-tools-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-minimal is earlier than 1:2.02-87.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203216045"/>
              <criterion comment="grub2-tools-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335036"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203218" version="638">
      <metadata>
        <title>ALSA-2020:3218: kernel security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3218" ref_url="https://errata.almalinux.org/8/ALSA-2020-3218.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3218" ref_url="https://access.redhat.com/errata/RHSA-2020:3218" source="RHSA"/>
        <reference ref_id="CVE-2019-20908" ref_url="https://access.redhat.com/security/cve/CVE-2019-20908" source="CVE"/>
        <reference ref_id="CVE-2020-15780" ref_url="https://access.redhat.com/security/cve/CVE-2020-15780" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)

* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837433)

* [Regression] RHEL8.2 RC  - [Boston/DD2.1] [RHEL8.2/kernel-4.18.0-193.el8.ppc64le] Host kernel crashes while running storage test bucket on KVM guest (iscsi) (BZ#1852048)

* RHEL8.2 - s390/mm: fix panic in gup_fast on large pud (BZ#1853336)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-29"/>
          <updated date="2020-07-29"/>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-20908" impact="moderate" public="20190819">CVE-2019-20908</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-15780" impact="moderate" public="20200615">CVE-2020-15780</cve>
          <bugzilla href="https://bugzilla.redhat.com/1852942" id="1852942">CVE-2019-20908 kernel: lockdown: bypass through ACPI write via efivar_ssdt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852962" id="1852962">CVE-2020-15780 kernel: lockdown: bypass through ACPI write via acpi_configfs</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.14.3.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203218051"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.14.3.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203218052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203218049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203219" version="637">
      <metadata>
        <title>ALSA-2020:3219: kernel-rt security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3219" ref_url="https://errata.almalinux.org/8/ALSA-2020-3219.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3219" ref_url="https://access.redhat.com/errata/RHSA-2020:3219" source="RHSA"/>
        <reference ref_id="CVE-2019-20908" ref_url="https://access.redhat.com/security/cve/CVE-2019-20908" source="CVE"/>
        <reference ref_id="CVE-2020-15780" ref_url="https://access.redhat.com/security/cve/CVE-2020-15780" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)

* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837441)

* kernel-rt: update RT source tree to the RHEL-8.2.z3 source tree (BZ#1856816)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-29"/>
          <updated date="2020-07-29"/>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-20908" impact="moderate" public="20190819">CVE-2019-20908</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-15780" impact="moderate" public="20200615">CVE-2020-15780</cve>
          <bugzilla href="https://bugzilla.redhat.com/1852942" id="1852942">CVE-2019-20908 kernel: lockdown: bypass through ACPI write via efivar_ssdt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852962" id="1852962">CVE-2020-15780 kernel: lockdown: bypass through ACPI write via acpi_configfs</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.14.3.rt13.67.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203218051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.14.3.rt13.67.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20203219026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.14.3.rt13.67.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203219023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203241" version="636">
      <metadata>
        <title>ALSA-2020:3241: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3241" ref_url="https://errata.almalinux.org/8/ALSA-2020-3241.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3241" ref_url="https://access.redhat.com/errata/RHSA-2020:3241" source="RHSA"/>
        <reference ref_id="CVE-2020-15652" ref_url="https://access.redhat.com/security/cve/CVE-2020-15652" source="CVE"/>
        <reference ref_id="CVE-2020-15659" ref_url="https://access.redhat.com/security/cve/CVE-2020-15659" source="CVE"/>
        <reference ref_id="CVE-2020-6463" ref_url="https://access.redhat.com/security/cve/CVE-2020-6463" source="CVE"/>
        <reference ref_id="CVE-2020-6514" ref_url="https://access.redhat.com/security/cve/CVE-2020-6514" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.11.0 ESR.

Security Fix(es):

* chromium-browser: Use after free in ANGLE (CVE-2020-6463)

* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514)

* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652)

* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-07-30"/>
          <updated date="2020-07-30"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://access.redhat.com/security/cve/CVE-2020-15652" impact="important" public="20200728">CVE-2020-15652</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15659" impact="important" public="20200728">CVE-2020-15659</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6463" impact="important" public="20200421">CVE-2020-6463</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2020-6514" impact="important" public="20200714">CVE-2020-6514</cve>
          <bugzilla href="https://bugzilla.redhat.com/1840893" id="1840893">CVE-2020-6463 chromium-browser: Use after free in ANGLE</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1857349" id="1857349">CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861570" id="1861570">CVE-2020-15652 Mozilla: Potential leak of redirect targets when loading scripts in a worker</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861572" id="1861572">CVE-2020-15659 Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:68.11.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203241001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203280" version="637">
      <metadata>
        <title>ALSA-2020:3280: nss and nspr security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3280" ref_url="https://errata.almalinux.org/8/ALSA-2020-3280.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3280" ref_url="https://access.redhat.com/errata/RHSA-2020:3280" source="RHSA"/>
        <reference ref_id="CVE-2019-11756" ref_url="https://access.redhat.com/security/cve/CVE-2019-11756" source="CVE"/>
        <reference ref_id="CVE-2019-17006" ref_url="https://access.redhat.com/security/cve/CVE-2019-17006" source="CVE"/>
        <reference ref_id="CVE-2019-17023" ref_url="https://access.redhat.com/security/cve/CVE-2019-17023" source="CVE"/>
        <reference ref_id="CVE-2020-12399" ref_url="https://access.redhat.com/security/cve/CVE-2020-12399" source="CVE"/>
        <reference ref_id="CVE-2020-12402" ref_url="https://access.redhat.com/security/cve/CVE-2020-12402" source="CVE"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.

The following packages have been upgraded to a later upstream version: nss (3.53.1), nspr (4.25.0). (BZ#1809549, BZ#1809550)

Security Fix(es):

* nss: UAF in sftk_FreeSession due to improper refcounting (CVE-2019-11756)

* nss: Check length of inputs for cryptographic primitives (CVE-2019-17006)

* nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402)

* nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Install of update of nss.x86_64 adds i686 into transaction (BZ#1663187)

* NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and TLS 1.1 (BZ#1691409)

* TLS Keying Material Exporter is unsupported by command line tools (BZ#1691454)

* TLS_AES_256_GCM_SHA384 is not marked as FIPS compatible (BZ#1711375)

* Make TLS 1.3 work in FIPS mode (BZ#1724250)

* NSS rejects records with large padding with SHA384 HMAC (BZ#1750921)

* NSS missing IKEv1 Quick Mode KDF (BZ#1809637)

* Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name (BZ#1825270)

* FIPS needs nss to restrict valid dh primes to those primes that are approved. (BZ#1854564)

* nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1855825)

Enhancement(s):

* [RFE] nss should use AES for storage of keys (BZ#1723819)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-03"/>
          <updated date="2020-08-03"/>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-11756" impact="moderate" public="20191210">CVE-2019-11756</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-17006" impact="moderate" public="20191226">CVE-2019-17006</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2019-17023" impact="low" public="20200108">CVE-2019-17023</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-12399" impact="moderate" public="20200521">CVE-2020-12399</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-12402" impact="moderate" public="20200602:1200">CVE-2020-12402</cve>
          <bugzilla href="https://bugzilla.redhat.com/1774835" id="1774835">CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775916" id="1775916">CVE-2019-17006 nss: Check length of inputs for cryptographic primitives</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791225" id="1791225">CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1826177" id="1826177">CVE-2020-12399 nss: Timing attack on DSA signature generation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1826231" id="1826231">CVE-2020-12402 nss: Side channel vulnerabilities during RSA key generation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nspr is earlier than 0:4.25.0-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280001"/>
              <criterion comment="nspr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nspr-devel is earlier than 0:4.25.0-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280003"/>
              <criterion comment="nspr-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280005"/>
              <criterion comment="nss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-devel is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280007"/>
              <criterion comment="nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280009"/>
              <criterion comment="nss-softokn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-devel is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280011"/>
              <criterion comment="nss-softokn-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280013"/>
              <criterion comment="nss-softokn-freebl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl-devel is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280015"/>
              <criterion comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-sysinit is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280017"/>
              <criterion comment="nss-sysinit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-tools is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280019"/>
              <criterion comment="nss-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280021"/>
              <criterion comment="nss-util is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util-devel is earlier than 0:3.53.1-11.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203280023"/>
              <criterion comment="nss-util-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203341" version="636">
      <metadata>
        <title>ALSA-2020:3341: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3341" ref_url="https://errata.almalinux.org/8/ALSA-2020-3341.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3341" ref_url="https://access.redhat.com/errata/RHSA-2020:3341" source="RHSA"/>
        <reference ref_id="CVE-2020-15652" ref_url="https://access.redhat.com/security/cve/CVE-2020-15652" source="CVE"/>
        <reference ref_id="CVE-2020-15659" ref_url="https://access.redhat.com/security/cve/CVE-2020-15659" source="CVE"/>
        <reference ref_id="CVE-2020-6463" ref_url="https://access.redhat.com/security/cve/CVE-2020-6463" source="CVE"/>
        <reference ref_id="CVE-2020-6514" ref_url="https://access.redhat.com/security/cve/CVE-2020-6514" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.11.0.

Security Fix(es):

* chromium-browser: Use after free in ANGLE (CVE-2020-6463)

* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514)

* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652)

* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-06"/>
          <updated date="2020-08-06"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://access.redhat.com/security/cve/CVE-2020-15652" impact="important" public="20200728">CVE-2020-15652</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15659" impact="important" public="20200728">CVE-2020-15659</cve>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-6463" impact="important" public="20200421">CVE-2020-6463</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://access.redhat.com/security/cve/CVE-2020-6514" impact="important" public="20200714">CVE-2020-6514</cve>
          <bugzilla href="https://bugzilla.redhat.com/1840893" id="1840893">CVE-2020-6463 chromium-browser: Use after free in ANGLE</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1857349" id="1857349">CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861570" id="1861570">CVE-2020-15652 Mozilla: Potential leak of redirect targets when loading scripts in a worker</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861572" id="1861572">CVE-2020-15659 Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.11.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203341001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203385" version="636">
      <metadata>
        <title>ALSA-2020:3385: libvncserver security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3385" ref_url="https://errata.almalinux.org/8/ALSA-2020-3385.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3385" ref_url="https://access.redhat.com/errata/RHSA-2020:3385" source="RHSA"/>
        <reference ref_id="CVE-2017-18922" ref_url="https://access.redhat.com/security/cve/CVE-2017-18922" source="CVE"/>
        <description>LibVNCServer is a C library that enables you to implement VNC server functionality into own programs.

Security Fix(es):

* libvncserver: websocket decoding buffer overflow (CVE-2017-18922)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-10"/>
          <updated date="2020-08-10"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2017-18922" impact="important" public="20170215">CVE-2017-18922</cve>
          <bugzilla href="https://bugzilla.redhat.com/1852356" id="1852356">CVE-2017-18922 libvncserver: websocket decoding buffer overflow</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libvncserver is earlier than 0:0.9.11-15.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20203385001"/>
              <criterion comment="libvncserver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvncserver-devel is earlier than 0:0.9.11-15.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20203385003"/>
              <criterion comment="libvncserver-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200920004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203386" version="635">
      <metadata>
        <title>ALSA-2020:3386: java-1.8.0-ibm security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3386" ref_url="https://errata.almalinux.org/8/ALSA-2020-3386.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3386" ref_url="https://access.redhat.com/errata/RHSA-2020:3386" source="RHSA"/>
        <reference ref_id="CVE-2019-17639" ref_url="https://access.redhat.com/security/cve/CVE-2019-17639" source="CVE"/>
        <reference ref_id="CVE-2020-14556" ref_url="https://access.redhat.com/security/cve/CVE-2020-14556" source="CVE"/>
        <reference ref_id="CVE-2020-14577" ref_url="https://access.redhat.com/security/cve/CVE-2020-14577" source="CVE"/>
        <reference ref_id="CVE-2020-14578" ref_url="https://access.redhat.com/security/cve/CVE-2020-14578" source="CVE"/>
        <reference ref_id="CVE-2020-14579" ref_url="https://access.redhat.com/security/cve/CVE-2020-14579" source="CVE"/>
        <reference ref_id="CVE-2020-14583" ref_url="https://access.redhat.com/security/cve/CVE-2020-14583" source="CVE"/>
        <reference ref_id="CVE-2020-14593" ref_url="https://access.redhat.com/security/cve/CVE-2020-14593" source="CVE"/>
        <reference ref_id="CVE-2020-14621" ref_url="https://access.redhat.com/security/cve/CVE-2020-14621" source="CVE"/>
        <reference ref_id="CVE-2020-2590" ref_url="https://access.redhat.com/security/cve/CVE-2020-2590" source="CVE"/>
        <reference ref_id="CVE-2020-2601" ref_url="https://access.redhat.com/security/cve/CVE-2020-2601" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP15.

Security Fix(es):

* OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601)

* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583)

* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593)

* IBM JDK: Information disclosure via calls to System.arraycopy() with invalid length (CVE-2019-17639)

* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)

* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556)

* OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578)

* OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579)

* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)

* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-10"/>
          <updated date="2020-08-10"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-17639" impact="moderate" public="20200805">CVE-2019-17639</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14556" impact="moderate" public="20200714">CVE-2020-14556</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14577" impact="low" public="20200714">CVE-2020-14577</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-14578" impact="moderate" public="20200714">CVE-2020-14578</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-14579" impact="moderate" public="20200714">CVE-2020-14579</cve>
          <cve cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14583" impact="important" public="20200714">CVE-2020-14583</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-14593" impact="important" public="20200714">CVE-2020-14593</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14621" impact="moderate" public="20200714">CVE-2020-14621</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-2590" impact="moderate" public="20200114">CVE-2020-2590</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-2601" impact="important" public="20200114">CVE-2020-2601</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790556" id="1790556">CVE-2020-2590 OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790570" id="1790570">CVE-2020-2601 OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856448" id="1856448">CVE-2020-14583 OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856784" id="1856784">CVE-2020-14593 OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856885" id="1856885">CVE-2020-14621 OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856896" id="1856896">CVE-2020-14556 OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856988" id="1856988">CVE-2020-14577 OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856991" id="1856991">CVE-2020-14578 OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856995" id="1856995">CVE-2020-14579 OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1866497" id="1866497">CVE-2019-17639 IBM JDK: Information disclosure via calls to System.arraycopy() with invalid length</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.15-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203386015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203422" version="637">
      <metadata>
        <title>ALSA-2020:3422: .NET Core 3.1 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3422" ref_url="https://errata.almalinux.org/8/ALSA-2020-3422.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3422" ref_url="https://access.redhat.com/errata/RHSA-2020:3422" source="RHSA"/>
        <reference ref_id="CVE-2020-1597" ref_url="https://access.redhat.com/security/cve/CVE-2020-1597" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.1.107 and .NET Core Runtime 3.1.7.

Security Fixes:

* .NET Core: ASP.NET Core Resource Consumption Denial of Service (CVE-2020-1597)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-11"/>
          <updated date="2020-08-11"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-1597" impact="important" public="20200811:1721">CVE-2020-1597</cve>
          <bugzilla href="https://bugzilla.redhat.com/1861110" id="1861110">CVE-2020-1597 dotnet: ASP.NET Core Resource Consumption Denial of Service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.1.107-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422007"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422011"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422013"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.107-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422015"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.7-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422017"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.107-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422019"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.1.107-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203422021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203557" version="636">
      <metadata>
        <title>ALSA-2020:3557: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3557" ref_url="https://errata.almalinux.org/8/ALSA-2020-3557.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3557" ref_url="https://access.redhat.com/errata/RHSA-2020:3557" source="RHSA"/>
        <reference ref_id="CVE-2020-12422" ref_url="https://access.redhat.com/security/cve/CVE-2020-12422" source="CVE"/>
        <reference ref_id="CVE-2020-12424" ref_url="https://access.redhat.com/security/cve/CVE-2020-12424" source="CVE"/>
        <reference ref_id="CVE-2020-12425" ref_url="https://access.redhat.com/security/cve/CVE-2020-12425" source="CVE"/>
        <reference ref_id="CVE-2020-15648" ref_url="https://access.redhat.com/security/cve/CVE-2020-15648" source="CVE"/>
        <reference ref_id="CVE-2020-15653" ref_url="https://access.redhat.com/security/cve/CVE-2020-15653" source="CVE"/>
        <reference ref_id="CVE-2020-15654" ref_url="https://access.redhat.com/security/cve/CVE-2020-15654" source="CVE"/>
        <reference ref_id="CVE-2020-15656" ref_url="https://access.redhat.com/security/cve/CVE-2020-15656" source="CVE"/>
        <reference ref_id="CVE-2020-15658" ref_url="https://access.redhat.com/security/cve/CVE-2020-15658" source="CVE"/>
        <reference ref_id="CVE-2020-15664" ref_url="https://access.redhat.com/security/cve/CVE-2020-15664" source="CVE"/>
        <reference ref_id="CVE-2020-15669" ref_url="https://access.redhat.com/security/cve/CVE-2020-15669" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.2.0 ESR.

Security Fix(es):

* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664)

* Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)

* Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422)

* Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648)

* Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653)

* Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656)

* Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424)

* Mozilla: Out of bound read in Date.parse() (CVE-2020-12425)

* Mozilla: Custom cursor can overlay user interface (CVE-2020-15654)

* Mozilla: Overriding file type when saving to disk (CVE-2020-15658)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-08-26"/>
          <updated date="2020-08-26"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-12422" impact="moderate" public="20200630">CVE-2020-12422</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2020-12424" impact="low" public="20200630">CVE-2020-12424</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-12425" impact="low" public="20200630">CVE-2020-12425</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2020-15648" impact="moderate" public="20200708">CVE-2020-15648</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-276" href="https://access.redhat.com/security/cve/CVE-2020-15653" impact="moderate" public="20200728">CVE-2020-15653</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2020-15654" impact="low" public="20200728">CVE-2020-15654</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-15656" impact="moderate" public="20200728">CVE-2020-15656</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-138" href="https://access.redhat.com/security/cve/CVE-2020-15658" impact="low" public="20200728">CVE-2020-15658</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2020-15664" impact="important" public="20200825">CVE-2020-15664</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-15669" impact="important" public="20200825">CVE-2020-15669</cve>
          <bugzilla href="https://bugzilla.redhat.com/1861645" id="1861645">CVE-2020-15653 Mozilla: Bypassing iframe sandbox when allowing popups</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861646" id="1861646">CVE-2020-15656 Mozilla: Type confusion for special arguments in IonMonkey</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861647" id="1861647">CVE-2020-15658 Mozilla: Overriding file type when saving to disk</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861649" id="1861649">CVE-2020-15654 Mozilla: Custom cursor can overlay user interface</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872531" id="1872531">CVE-2020-15664 Mozilla: Attacker-induced prompt for extension installation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872532" id="1872532">CVE-2020-15669 Mozilla: Use-After-Free when aborting an operation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872537" id="1872537">CVE-2020-15648 Mozilla: X-Frame-Options bypass using object or embed tags</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872538" id="1872538">CVE-2020-12422 Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872539" id="1872539">CVE-2020-12424 Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872540" id="1872540">CVE-2020-12425 Mozilla: Out of bound read in Date.parse()</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.2.0-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203557001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203623" version="635">
      <metadata>
        <title>ALSA-2020:3623: squid:4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3623" ref_url="https://errata.almalinux.org/8/ALSA-2020-3623.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3623" ref_url="https://access.redhat.com/errata/RHSA-2020:3623" source="RHSA"/>
        <reference ref_id="CVE-2020-15810" ref_url="https://access.redhat.com/security/cve/CVE-2020-15810" source="CVE"/>
        <reference ref_id="CVE-2020-15811" ref_url="https://access.redhat.com/security/cve/CVE-2020-15811" source="CVE"/>
        <description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)

* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-03"/>
          <updated date="2020-09-03"/>
          <cve cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-15810" impact="important" public="20200823">CVE-2020-15810</cve>
          <cve cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-15811" impact="important" public="20200823">CVE-2020-15811</cve>
          <bugzilla href="https://bugzilla.redhat.com/1871700" id="1871700">CVE-2020-15810 squid: HTTP Request Smuggling could result in cache poisoning</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1871702" id="1871702">CVE-2020-15811 squid: HTTP Request Splitting could result in cache poisoning</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module squid:4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192593007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760011"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760012"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760031"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760032"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.2.0+319+d18e041f.1" test_ref="oval:org.almalinux.alsa:tst:202036230051"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.4-8.module_el8.3.0+623+2bb85980.2" test_ref="oval:org.almalinux.alsa:tst:202036230052"/>
              <criterion comment="squid is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925930062"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203634" version="636">
      <metadata>
        <title>ALSA-2020:3634: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3634" ref_url="https://errata.almalinux.org/8/ALSA-2020-3634.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3634" ref_url="https://access.redhat.com/errata/RHSA-2020:3634" source="RHSA"/>
        <reference ref_id="CVE-2020-15664" ref_url="https://access.redhat.com/security/cve/CVE-2020-15664" source="CVE"/>
        <reference ref_id="CVE-2020-15669" ref_url="https://access.redhat.com/security/cve/CVE-2020-15669" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 68.12.0.

Security Fix(es):

* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664)

* Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-07"/>
          <updated date="2020-09-07"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-648" href="https://access.redhat.com/security/cve/CVE-2020-15664" impact="important" public="20200825">CVE-2020-15664</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-15669" impact="important" public="20200825">CVE-2020-15669</cve>
          <bugzilla href="https://bugzilla.redhat.com/1872531" id="1872531">CVE-2020-15664 Mozilla: Attacker-induced prompt for extension installation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1872532" id="1872532">CVE-2020-15669 Mozilla: Use-After-Free when aborting an operation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:68.12.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203634001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203654" version="635">
      <metadata>
        <title>ALSA-2020:3654: libcroco security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3654" ref_url="https://errata.almalinux.org/8/ALSA-2020-3654.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3654" ref_url="https://access.redhat.com/errata/RHSA-2020:3654" source="RHSA"/>
        <reference ref_id="CVE-2020-12825" ref_url="https://access.redhat.com/security/cve/CVE-2020-12825" source="CVE"/>
        <description>The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. 

Security Fix(es):

* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-674-&gt;CWE-121" href="https://access.redhat.com/security/cve/CVE-2020-12825" impact="moderate" public="20200512">CVE-2020-12825</cve>
          <bugzilla href="https://bugzilla.redhat.com/1835377" id="1835377">CVE-2020-12825 libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libcroco is earlier than 0:0.6.12-4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20203654001"/>
              <criterion comment="libcroco is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203654002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcroco-devel is earlier than 0:0.6.12-4.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20203654003"/>
              <criterion comment="libcroco-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203654004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203658" version="635">
      <metadata>
        <title>ALSA-2020:3658: librepo security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3658" ref_url="https://errata.almalinux.org/8/ALSA-2020-3658.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3658" ref_url="https://access.redhat.com/errata/RHSA-2020:3658" source="RHSA"/>
        <reference ref_id="CVE-2020-14352" ref_url="https://access.redhat.com/security/cve/CVE-2020-14352" source="CVE"/>
        <description>The librepo library provides a C and Python API to download repository metadata.

Security Fix(es):

* librepo: missing path validation in repomd.xml may lead to directory traversal (CVE-2020-14352)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="8.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-14352" impact="important" public="20200813">CVE-2020-14352</cve>
          <bugzilla href="https://bugzilla.redhat.com/1866498" id="1866498">CVE-2020-14352 librepo: missing path validation in repomd.xml may lead to directory traversal</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="librepo is earlier than 0:1.11.0-3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203658001"/>
              <criterion comment="librepo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-librepo is earlier than 0:1.11.0-3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203658003"/>
              <criterion comment="python3-librepo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583042"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203662" version="638">
      <metadata>
        <title>ALSA-2020:3662: php:7.3 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3662" ref_url="https://errata.almalinux.org/8/ALSA-2020-3662.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3662" ref_url="https://access.redhat.com/errata/RHSA-2020:3662" source="RHSA"/>
        <reference ref_id="CVE-2019-11039" ref_url="https://access.redhat.com/security/cve/CVE-2019-11039" source="CVE"/>
        <reference ref_id="CVE-2019-11040" ref_url="https://access.redhat.com/security/cve/CVE-2019-11040" source="CVE"/>
        <reference ref_id="CVE-2019-11041" ref_url="https://access.redhat.com/security/cve/CVE-2019-11041" source="CVE"/>
        <reference ref_id="CVE-2019-11042" ref_url="https://access.redhat.com/security/cve/CVE-2019-11042" source="CVE"/>
        <reference ref_id="CVE-2019-11045" ref_url="https://access.redhat.com/security/cve/CVE-2019-11045" source="CVE"/>
        <reference ref_id="CVE-2019-11047" ref_url="https://access.redhat.com/security/cve/CVE-2019-11047" source="CVE"/>
        <reference ref_id="CVE-2019-11048" ref_url="https://access.redhat.com/security/cve/CVE-2019-11048" source="CVE"/>
        <reference ref_id="CVE-2019-11050" ref_url="https://access.redhat.com/security/cve/CVE-2019-11050" source="CVE"/>
        <reference ref_id="CVE-2019-13224" ref_url="https://access.redhat.com/security/cve/CVE-2019-13224" source="CVE"/>
        <reference ref_id="CVE-2019-13225" ref_url="https://access.redhat.com/security/cve/CVE-2019-13225" source="CVE"/>
        <reference ref_id="CVE-2019-16163" ref_url="https://access.redhat.com/security/cve/CVE-2019-16163" source="CVE"/>
        <reference ref_id="CVE-2019-19203" ref_url="https://access.redhat.com/security/cve/CVE-2019-19203" source="CVE"/>
        <reference ref_id="CVE-2019-19204" ref_url="https://access.redhat.com/security/cve/CVE-2019-19204" source="CVE"/>
        <reference ref_id="CVE-2019-19246" ref_url="https://access.redhat.com/security/cve/CVE-2019-19246" source="CVE"/>
        <reference ref_id="CVE-2019-20454" ref_url="https://access.redhat.com/security/cve/CVE-2019-20454" source="CVE"/>
        <reference ref_id="CVE-2020-7059" ref_url="https://access.redhat.com/security/cve/CVE-2020-7059" source="CVE"/>
        <reference ref_id="CVE-2020-7060" ref_url="https://access.redhat.com/security/cve/CVE-2020-7060" source="CVE"/>
        <reference ref_id="CVE-2020-7062" ref_url="https://access.redhat.com/security/cve/CVE-2020-7062" source="CVE"/>
        <reference ref_id="CVE-2020-7063" ref_url="https://access.redhat.com/security/cve/CVE-2020-7063" source="CVE"/>
        <reference ref_id="CVE-2020-7064" ref_url="https://access.redhat.com/security/cve/CVE-2020-7064" source="CVE"/>
        <reference ref_id="CVE-2020-7065" ref_url="https://access.redhat.com/security/cve/CVE-2020-7065" source="CVE"/>
        <reference ref_id="CVE-2020-7066" ref_url="https://access.redhat.com/security/cve/CVE-2020-7066" source="CVE"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655)

Security Fix(es):

* php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039)

* php: Buffer over-read in exif_read_data() (CVE-2019-11040)

* php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045)

* php: Information disclosure in exif_read_data() (CVE-2019-11047)

* php: Integer wraparounds when receiving multipart forms (CVE-2019-11048)

* oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224)

* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)

* oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163)

* oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203)

* oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204)

* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)

* php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059)

* php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060)

* php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062)

* php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063)

* php: Information disclosure in exif_read_data() function (CVE-2020-7064)

* php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065)

* php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041)

* php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042)

* php: Out of bounds read when parsing EXIF information (CVE-2019-11050)

* oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246)

* php: Information disclosure in function get_headers (CVE-2020-7066)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-190-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11039" impact="moderate" public="20190618">CVE-2019-11039</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11040" impact="moderate" public="20190618">CVE-2019-11040</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11041" impact="low" public="20190809">CVE-2019-11041</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-11042" impact="low" public="20190809">CVE-2019-11042</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-170" href="https://access.redhat.com/security/cve/CVE-2019-11045" impact="moderate" public="20191222">CVE-2019-11045</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11047" impact="moderate" public="20191222">CVE-2019-11047</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-11048" impact="moderate" public="20200514">CVE-2019-11048</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-11050" impact="low" public="20191107">CVE-2019-11050</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-13224" impact="moderate" public="20190627">CVE-2019-13224</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13225" impact="moderate" public="20190627">CVE-2019-13225</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674-&gt;CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-16163" impact="moderate" public="20190728">CVE-2019-16163</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-19203" impact="moderate" public="20191106">CVE-2019-19203</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-19204" impact="moderate" public="20191106">CVE-2019-19204</cve>
          <cve cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-19246" impact="low" public="20190813">CVE-2019-19246</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20454" impact="moderate" public="20190728">CVE-2019-20454</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-7059" impact="moderate" public="20200123">CVE-2020-7059</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-7060" impact="moderate" public="20200123">CVE-2020-7060</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-7062" impact="moderate" public="20200204">CVE-2020-7062</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-7063" impact="moderate" public="20200108">CVE-2020-7063</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-7064" impact="moderate" public="20200401">CVE-2020-7064</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="(CWE-787|CWE-121)" href="https://access.redhat.com/security/cve/CVE-2020-7065" impact="moderate" public="20200401">CVE-2020-7065</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-7066" impact="low" public="20200401">CVE-2020-7066</cve>
          <bugzilla href="https://bugzilla.redhat.com/1724152" id="1724152">CVE-2019-11039 php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1724154" id="1724154">CVE-2019-11040 php: Buffer over-read in exif_read_data()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728965" id="1728965">CVE-2019-13225 oniguruma: NULL pointer dereference in match_at() in regexec.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1728970" id="1728970">CVE-2019-13224 oniguruma: Use-after-free in onig_new_deluxe() in regext.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1735494" id="1735494">CVE-2019-20454 pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1739459" id="1739459">CVE-2019-11041 php: Heap buffer over-read in exif_scan_thumbnail()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1739465" id="1739465">CVE-2019-11042 php: Heap buffer over-read in exif_process_user_comment()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1768997" id="1768997">CVE-2019-16163 oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777537" id="1777537">CVE-2019-19246 oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786570" id="1786570">CVE-2019-11047 php: Information disclosure in exif_read_data()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786572" id="1786572">CVE-2019-11045 php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788258" id="1788258">CVE-2019-11050 php: Out of bounds read when parsing EXIF information</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1797776" id="1797776">CVE-2020-7059 php: Out of bounds read in php_strip_tags_ex</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1797779" id="1797779">CVE-2020-7060 php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802061" id="1802061">CVE-2019-19203 oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802068" id="1802068">CVE-2019-19204 oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1808532" id="1808532">CVE-2020-7062 php: NULL pointer dereference in PHP session upload progress</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1808536" id="1808536">CVE-2020-7063 php: Files added to tar with Phar::buildFromIterator have all-access permissions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820601" id="1820601">CVE-2020-7064 php: Information disclosure in exif_read_data() function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820604" id="1820604">CVE-2020-7066 php: Information disclosure in function get_headers</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820627" id="1820627">CVE-2020-7065 php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1837842" id="1837842">CVE-2019-11048 php: Integer wraparounds when receiving multipart forms</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module php:7.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193736071"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360011"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360012"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="apcu-panel is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360013"/>
              <criterion comment="apcu-panel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735002"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360031"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360032"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360033"/>
              <criterion comment="libzip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360051"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360052"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-devel is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360053"/>
              <criterion comment="libzip-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360071"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360072"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libzip-tools is earlier than 0:1.5.2-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360073"/>
              <criterion comment="libzip-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620091"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620092"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620093"/>
              <criterion comment="php is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620111"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620112"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-bcmath is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620113"/>
              <criterion comment="php-bcmath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620131"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620132"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-cli is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620133"/>
              <criterion comment="php-cli is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620151"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620152"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-common is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620153"/>
              <criterion comment="php-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620171"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620172"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dba is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620173"/>
              <criterion comment="php-dba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620191"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620192"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-dbg is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620193"/>
              <criterion comment="php-dbg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620211"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620212"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-devel is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620213"/>
              <criterion comment="php-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620231"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620232"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-embedded is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620233"/>
              <criterion comment="php-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620251"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620252"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-enchant is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620253"/>
              <criterion comment="php-enchant is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620271"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620272"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-fpm is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620273"/>
              <criterion comment="php-fpm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620291"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620292"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gd is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620293"/>
              <criterion comment="php-gd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620311"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620312"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-gmp is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620313"/>
              <criterion comment="php-gmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620331"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620332"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-intl is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620333"/>
              <criterion comment="php-intl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620351"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620352"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-json is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620353"/>
              <criterion comment="php-json is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620371"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620372"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-ldap is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620373"/>
              <criterion comment="php-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620391"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620392"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mbstring is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620393"/>
              <criterion comment="php-mbstring is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620411"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620412"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-mysqlnd is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620413"/>
              <criterion comment="php-mysqlnd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620431"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620432"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-odbc is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620433"/>
              <criterion comment="php-odbc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620451"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620452"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-opcache is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620453"/>
              <criterion comment="php-opcache is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620471"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620472"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pdo is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620473"/>
              <criterion comment="php-pdo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360491"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360492"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pear is earlier than 1:1.10.9-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360493"/>
              <criterion comment="php-pear is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735050"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360511"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360512"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360513"/>
              <criterion comment="php-pecl-apcu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360531"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360532"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-apcu-devel is earlier than 0:5.1.17-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360533"/>
              <criterion comment="php-pecl-apcu-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-rrd is earlier than 0:2.0.1-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620551"/>
              <criterion comment="php-pecl-rrd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-rrd is earlier than 0:2.0.1-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620552"/>
              <criterion comment="php-pecl-rrd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-rrd is earlier than 0:2.0.1-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620553"/>
              <criterion comment="php-pecl-rrd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-xdebug is earlier than 0:2.8.0-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620571"/>
              <criterion comment="php-pecl-xdebug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-xdebug is earlier than 0:2.8.0-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620572"/>
              <criterion comment="php-pecl-xdebug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-xdebug is earlier than 0:2.8.0-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620573"/>
              <criterion comment="php-pecl-xdebug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203662058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360551"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:201937360552"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pecl-zip is earlier than 0:1.15.4-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:201937360553"/>
              <criterion comment="php-pecl-zip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620611"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620612"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-pgsql is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620613"/>
              <criterion comment="php-pgsql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620631"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620632"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-process is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620633"/>
              <criterion comment="php-process is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620651"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620652"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-recode is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620653"/>
              <criterion comment="php-recode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620671"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620672"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-snmp is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620673"/>
              <criterion comment="php-snmp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620691"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620692"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-soap is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620693"/>
              <criterion comment="php-soap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620711"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620712"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xml is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620713"/>
              <criterion comment="php-xml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.3.20-1.module_el8.3.0+2009+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620731"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.3.20-1.module_el8.4.0+2229+b272fdef" test_ref="oval:org.almalinux.alsa:tst:202036620732"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="php-xmlrpc is earlier than 0:7.3.20-1.module_el8.5.0+152+112d3b8c" test_ref="oval:org.almalinux.alsa:tst:202036620733"/>
              <criterion comment="php-xmlrpc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193735070"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203665" version="636">
      <metadata>
        <title>ALSA-2020:3665: go-toolset:rhel8 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3665" ref_url="https://errata.almalinux.org/8/ALSA-2020-3665.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3665" ref_url="https://access.redhat.com/errata/RHSA-2020:3665" source="RHSA"/>
        <reference ref_id="CVE-2020-14040" ref_url="https://access.redhat.com/security/cve/CVE-2020-14040" source="CVE"/>
        <reference ref_id="CVE-2020-15586" ref_url="https://access.redhat.com/security/cve/CVE-2020-15586" source="CVE"/>
        <reference ref_id="CVE-2020-16845" ref_url="https://access.redhat.com/security/cve/CVE-2020-16845" source="CVE"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)

* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)

* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-14040" impact="moderate" public="20200617">CVE-2020-14040</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-362" href="https://access.redhat.com/security/cve/CVE-2020-15586" impact="moderate" public="20200714">CVE-2020-15586</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-16845" impact="moderate" public="20200806">CVE-2020-16845</cve>
          <bugzilla href="https://bugzilla.redhat.com/1853652" id="1853652">CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856953" id="1856953">CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1867099" id="1867099">CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="delve is earlier than 0:1.3.2-3.module_el8.2.0+306+4f5ea1ce" test_ref="oval:org.almalinux.alsa:tst:202036650011"/>
              <criterion comment="delve is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036650022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="go-toolset is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650031"/>
              <criterion comment="go-toolset is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650051"/>
              <criterion comment="golang is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650071"/>
              <criterion comment="golang-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650091"/>
              <criterion comment="golang-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650111"/>
              <criterion comment="golang-misc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190102"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650131"/>
              <criterion comment="golang-race is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650151"/>
              <criterion comment="golang-src is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is earlier than 0:1.13.15-1.module_el8.2.0+490+5bc58d45" test_ref="oval:org.almalinux.alsa:tst:202036650171"/>
              <criterion comment="golang-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190162"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203669" version="639">
      <metadata>
        <title>ALSA-2020:3669: postgresql:10 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3669" ref_url="https://errata.almalinux.org/8/ALSA-2020-3669.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3669" ref_url="https://access.redhat.com/errata/RHSA-2020:3669" source="RHSA"/>
        <reference ref_id="CVE-2019-10130" ref_url="https://access.redhat.com/security/cve/CVE-2019-10130" source="CVE"/>
        <reference ref_id="CVE-2019-10164" ref_url="https://access.redhat.com/security/cve/CVE-2019-10164" source="CVE"/>
        <reference ref_id="CVE-2019-10208" ref_url="https://access.redhat.com/security/cve/CVE-2019-10208" source="CVE"/>
        <reference ref_id="CVE-2020-14349" ref_url="https://access.redhat.com/security/cve/CVE-2020-14349" source="CVE"/>
        <reference ref_id="CVE-2020-14350" ref_url="https://access.redhat.com/security/cve/CVE-2020-14350" source="CVE"/>
        <reference ref_id="CVE-2020-1720" ref_url="https://access.redhat.com/security/cve/CVE-2020-1720" source="CVE"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

The following packages have been upgraded to a later upstream version: postgresql (10.14).

Security Fix(es):

* postgresql: Stack-based buffer overflow via setting a password (CVE-2019-10164)

* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208)

* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)

* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)

* postgresql: Selectivity estimators bypass row security policies (CVE-2019-10130)

* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Module stream postgresql:10 does not have correct module.md file (BZ#1857228)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-10130" impact="low" public="20190509">CVE-2019-10130</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-10164" impact="moderate" public="20190620">CVE-2019-10164</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2019-10208" impact="moderate" public="20190808">CVE-2019-10208</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14349" impact="moderate" public="20200813">CVE-2020-14349</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14350" impact="moderate" public="20200813">CVE-2020-14350</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2020-1720" impact="low" public="20200213">CVE-2020-1720</cve>
          <bugzilla href="https://bugzilla.redhat.com/1707109" id="1707109">CVE-2019-10130 postgresql: Selectivity estimators bypass row security policies</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1719698" id="1719698">CVE-2019-10164 postgresql: Stack-based buffer overflow via setting a password</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1734416" id="1734416">CVE-2019-10208 postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798852" id="1798852">CVE-2020-1720 postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865744" id="1865744">CVE-2020-14349 postgresql: Uncontrolled search path element in logical replication</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865746" id="1865746">CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE EXTENSION</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module postgresql:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20203669027"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690011"/>
              <criterion comment="postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690031"/>
              <criterion comment="postgresql-contrib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690051"/>
              <criterion comment="postgresql-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690071"/>
              <criterion comment="postgresql-plperl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690091"/>
              <criterion comment="postgresql-plpython3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690111"/>
              <criterion comment="postgresql-pltcl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690131"/>
              <criterion comment="postgresql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690151"/>
              <criterion comment="postgresql-server-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690171"/>
              <criterion comment="postgresql-static is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690191"/>
              <criterion comment="postgresql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690211"/>
              <criterion comment="postgresql-test-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690231"/>
              <criterion comment="postgresql-upgrade is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade-devel is earlier than 0:10.14-1.module_el8.2.0+487+53cc39ce" test_ref="oval:org.almalinux.alsa:tst:202036690251"/>
              <criterion comment="postgresql-upgrade-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690262"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203699" version="637">
      <metadata>
        <title>ALSA-2020:3699: .NET Core 3.1 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3699" ref_url="https://errata.almalinux.org/8/ALSA-2020-3699.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3699" ref_url="https://access.redhat.com/errata/RHSA-2020:3699" source="RHSA"/>
        <reference ref_id="CVE-2020-1045" ref_url="https://access.redhat.com/security/cve/CVE-2020-1045" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.1.108 and .NET Core Runtime 3.1.8.

Security Fixes:

* .NET Core: ASP.NET cookie prefix spoofing vulnerability (CVE-2020-1045)

Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-08"/>
          <updated date="2020-09-08"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-807" href="https://access.redhat.com/security/cve/CVE-2020-1045" impact="important" public="20200701">CVE-2020-1045</cve>
          <bugzilla href="https://bugzilla.redhat.com/1873451" id="1873451">CVE-2020-1045 dotnet: ASP.NET cookie prefix spoofing vulnerability</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:3.1.108-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699007"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699011"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699013"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.108-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699015"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.8-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699017"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.108-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699019"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:3.1.108-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203699021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203713" version="635">
      <metadata>
        <title>ALSA-2020:3713: dovecot security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3713" ref_url="https://errata.almalinux.org/8/ALSA-2020-3713.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3713" ref_url="https://access.redhat.com/errata/RHSA-2020:3713" source="RHSA"/>
        <reference ref_id="CVE-2020-12100" ref_url="https://access.redhat.com/security/cve/CVE-2020-12100" source="CVE"/>
        <reference ref_id="CVE-2020-12673" ref_url="https://access.redhat.com/security/cve/CVE-2020-12673" source="CVE"/>
        <reference ref_id="CVE-2020-12674" ref_url="https://access.redhat.com/security/cve/CVE-2020-12674" source="CVE"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: Resource exhaustion via deeply nested MIME parts (CVE-2020-12100)

* dovecot: Out of bound reads in dovecot NTLM implementation (CVE-2020-12673)

* dovecot: Crash due to assert in RPA implementation (CVE-2020-12674)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-10"/>
          <updated date="2020-09-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://access.redhat.com/security/cve/CVE-2020-12100" impact="important" public="20200812:1200">CVE-2020-12100</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-12673" impact="important" public="20200812:1200">CVE-2020-12673</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-12674" impact="important" public="20200812:1200">CVE-2020-12674</cve>
          <bugzilla href="https://bugzilla.redhat.com/1866309" id="1866309">CVE-2020-12100 dovecot: Resource exhaustion via deeply nested MIME parts</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1866313" id="1866313">CVE-2020-12673 dovecot: Out of bound reads in dovecot NTLM implementation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1866317" id="1866317">CVE-2020-12674 dovecot: Crash due to assert in RPA implementation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dovecot is earlier than 1:2.3.8-2.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20203713001"/>
              <criterion comment="dovecot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-devel is earlier than 1:2.3.8-2.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20203713003"/>
              <criterion comment="dovecot-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-mysql is earlier than 1:2.3.8-2.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20203713005"/>
              <criterion comment="dovecot-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pgsql is earlier than 1:2.3.8-2.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20203713007"/>
              <criterion comment="dovecot-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pigeonhole is earlier than 1:2.3.8-2.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20203713009"/>
              <criterion comment="dovecot-pigeonhole is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193467010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203714" version="635">
      <metadata>
        <title>ALSA-2020:3714: httpd:2.4 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3714" ref_url="https://errata.almalinux.org/8/ALSA-2020-3714.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3714" ref_url="https://access.redhat.com/errata/RHSA-2020:3714" source="RHSA"/>
        <reference ref_id="CVE-2020-9490" ref_url="https://access.redhat.com/security/cve/CVE-2020-9490" source="CVE"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: Push diary crash on specifically crafted HTTP/2 header (CVE-2020-9490)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-10"/>
          <updated date="2020-09-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-9490" impact="important" public="20200807">CVE-2020-9490</cve>
          <bugzilla href="https://bugzilla.redhat.com/1866560" id="1866560">CVE-2020-9490 httpd: Push diary crash on specifically crafted HTTP/2 header</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module httpd:2.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190980023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="httpd is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140011"/>
              <criterion comment="httpd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140031"/>
              <criterion comment="httpd-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140051"/>
              <criterion comment="httpd-filesystem is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140071"/>
              <criterion comment="httpd-manual is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140091"/>
              <criterion comment="httpd-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is earlier than 0:1.11.3-3.module_el8.2.0+486+c01050f0.1" test_ref="oval:org.almalinux.alsa:tst:202037140111"/>
              <criterion comment="mod_http2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140131"/>
              <criterion comment="mod_ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is earlier than 1:2.0.8-7.module_el8.2.0+307+4d18d695" test_ref="oval:org.almalinux.alsa:tst:202037140151"/>
              <criterion comment="mod_md is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140171"/>
              <criterion comment="mod_proxy_html is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is earlier than 0:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140191"/>
              <criterion comment="mod_session is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is earlier than 1:2.4.37-21.module_el8.2.0+494+1df74eae" test_ref="oval:org.almalinux.alsa:tst:202037140211"/>
              <criterion comment="mod_ssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800222"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203732" version="635">
      <metadata>
        <title>ALSA-2020:3732: mysql:8.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3732" ref_url="https://errata.almalinux.org/8/ALSA-2020-3732.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3732" ref_url="https://access.redhat.com/errata/RHSA-2020:3732" source="RHSA"/>
        <reference ref_id="CVE-2019-2911" ref_url="https://access.redhat.com/security/cve/CVE-2019-2911" source="CVE"/>
        <reference ref_id="CVE-2019-2914" ref_url="https://access.redhat.com/security/cve/CVE-2019-2914" source="CVE"/>
        <reference ref_id="CVE-2019-2938" ref_url="https://access.redhat.com/security/cve/CVE-2019-2938" source="CVE"/>
        <reference ref_id="CVE-2019-2946" ref_url="https://access.redhat.com/security/cve/CVE-2019-2946" source="CVE"/>
        <reference ref_id="CVE-2019-2957" ref_url="https://access.redhat.com/security/cve/CVE-2019-2957" source="CVE"/>
        <reference ref_id="CVE-2019-2960" ref_url="https://access.redhat.com/security/cve/CVE-2019-2960" source="CVE"/>
        <reference ref_id="CVE-2019-2963" ref_url="https://access.redhat.com/security/cve/CVE-2019-2963" source="CVE"/>
        <reference ref_id="CVE-2019-2966" ref_url="https://access.redhat.com/security/cve/CVE-2019-2966" source="CVE"/>
        <reference ref_id="CVE-2019-2967" ref_url="https://access.redhat.com/security/cve/CVE-2019-2967" source="CVE"/>
        <reference ref_id="CVE-2019-2968" ref_url="https://access.redhat.com/security/cve/CVE-2019-2968" source="CVE"/>
        <reference ref_id="CVE-2019-2974" ref_url="https://access.redhat.com/security/cve/CVE-2019-2974" source="CVE"/>
        <reference ref_id="CVE-2019-2982" ref_url="https://access.redhat.com/security/cve/CVE-2019-2982" source="CVE"/>
        <reference ref_id="CVE-2019-2991" ref_url="https://access.redhat.com/security/cve/CVE-2019-2991" source="CVE"/>
        <reference ref_id="CVE-2019-2993" ref_url="https://access.redhat.com/security/cve/CVE-2019-2993" source="CVE"/>
        <reference ref_id="CVE-2019-2997" ref_url="https://access.redhat.com/security/cve/CVE-2019-2997" source="CVE"/>
        <reference ref_id="CVE-2019-2998" ref_url="https://access.redhat.com/security/cve/CVE-2019-2998" source="CVE"/>
        <reference ref_id="CVE-2019-3004" ref_url="https://access.redhat.com/security/cve/CVE-2019-3004" source="CVE"/>
        <reference ref_id="CVE-2019-3009" ref_url="https://access.redhat.com/security/cve/CVE-2019-3009" source="CVE"/>
        <reference ref_id="CVE-2019-3011" ref_url="https://access.redhat.com/security/cve/CVE-2019-3011" source="CVE"/>
        <reference ref_id="CVE-2019-3018" ref_url="https://access.redhat.com/security/cve/CVE-2019-3018" source="CVE"/>
        <reference ref_id="CVE-2020-14539" ref_url="https://access.redhat.com/security/cve/CVE-2020-14539" source="CVE"/>
        <reference ref_id="CVE-2020-14540" ref_url="https://access.redhat.com/security/cve/CVE-2020-14540" source="CVE"/>
        <reference ref_id="CVE-2020-14547" ref_url="https://access.redhat.com/security/cve/CVE-2020-14547" source="CVE"/>
        <reference ref_id="CVE-2020-14550" ref_url="https://access.redhat.com/security/cve/CVE-2020-14550" source="CVE"/>
        <reference ref_id="CVE-2020-14553" ref_url="https://access.redhat.com/security/cve/CVE-2020-14553" source="CVE"/>
        <reference ref_id="CVE-2020-14559" ref_url="https://access.redhat.com/security/cve/CVE-2020-14559" source="CVE"/>
        <reference ref_id="CVE-2020-14567" ref_url="https://access.redhat.com/security/cve/CVE-2020-14567" source="CVE"/>
        <reference ref_id="CVE-2020-14568" ref_url="https://access.redhat.com/security/cve/CVE-2020-14568" source="CVE"/>
        <reference ref_id="CVE-2020-14575" ref_url="https://access.redhat.com/security/cve/CVE-2020-14575" source="CVE"/>
        <reference ref_id="CVE-2020-14576" ref_url="https://access.redhat.com/security/cve/CVE-2020-14576" source="CVE"/>
        <reference ref_id="CVE-2020-14586" ref_url="https://access.redhat.com/security/cve/CVE-2020-14586" source="CVE"/>
        <reference ref_id="CVE-2020-14597" ref_url="https://access.redhat.com/security/cve/CVE-2020-14597" source="CVE"/>
        <reference ref_id="CVE-2020-14614" ref_url="https://access.redhat.com/security/cve/CVE-2020-14614" source="CVE"/>
        <reference ref_id="CVE-2020-14619" ref_url="https://access.redhat.com/security/cve/CVE-2020-14619" source="CVE"/>
        <reference ref_id="CVE-2020-14620" ref_url="https://access.redhat.com/security/cve/CVE-2020-14620" source="CVE"/>
        <reference ref_id="CVE-2020-14623" ref_url="https://access.redhat.com/security/cve/CVE-2020-14623" source="CVE"/>
        <reference ref_id="CVE-2020-14624" ref_url="https://access.redhat.com/security/cve/CVE-2020-14624" source="CVE"/>
        <reference ref_id="CVE-2020-14631" ref_url="https://access.redhat.com/security/cve/CVE-2020-14631" source="CVE"/>
        <reference ref_id="CVE-2020-14632" ref_url="https://access.redhat.com/security/cve/CVE-2020-14632" source="CVE"/>
        <reference ref_id="CVE-2020-14633" ref_url="https://access.redhat.com/security/cve/CVE-2020-14633" source="CVE"/>
        <reference ref_id="CVE-2020-14634" ref_url="https://access.redhat.com/security/cve/CVE-2020-14634" source="CVE"/>
        <reference ref_id="CVE-2020-14641" ref_url="https://access.redhat.com/security/cve/CVE-2020-14641" source="CVE"/>
        <reference ref_id="CVE-2020-14643" ref_url="https://access.redhat.com/security/cve/CVE-2020-14643" source="CVE"/>
        <reference ref_id="CVE-2020-14651" ref_url="https://access.redhat.com/security/cve/CVE-2020-14651" source="CVE"/>
        <reference ref_id="CVE-2020-14654" ref_url="https://access.redhat.com/security/cve/CVE-2020-14654" source="CVE"/>
        <reference ref_id="CVE-2020-14656" ref_url="https://access.redhat.com/security/cve/CVE-2020-14656" source="CVE"/>
        <reference ref_id="CVE-2020-14663" ref_url="https://access.redhat.com/security/cve/CVE-2020-14663" source="CVE"/>
        <reference ref_id="CVE-2020-14678" ref_url="https://access.redhat.com/security/cve/CVE-2020-14678" source="CVE"/>
        <reference ref_id="CVE-2020-14680" ref_url="https://access.redhat.com/security/cve/CVE-2020-14680" source="CVE"/>
        <reference ref_id="CVE-2020-14697" ref_url="https://access.redhat.com/security/cve/CVE-2020-14697" source="CVE"/>
        <reference ref_id="CVE-2020-14702" ref_url="https://access.redhat.com/security/cve/CVE-2020-14702" source="CVE"/>
        <reference ref_id="CVE-2020-14725" ref_url="https://access.redhat.com/security/cve/CVE-2020-14725" source="CVE"/>
        <reference ref_id="CVE-2020-14799" ref_url="https://access.redhat.com/security/cve/CVE-2020-14799" source="CVE"/>
        <reference ref_id="CVE-2020-2570" ref_url="https://access.redhat.com/security/cve/CVE-2020-2570" source="CVE"/>
        <reference ref_id="CVE-2020-2573" ref_url="https://access.redhat.com/security/cve/CVE-2020-2573" source="CVE"/>
        <reference ref_id="CVE-2020-2574" ref_url="https://access.redhat.com/security/cve/CVE-2020-2574" source="CVE"/>
        <reference ref_id="CVE-2020-2577" ref_url="https://access.redhat.com/security/cve/CVE-2020-2577" source="CVE"/>
        <reference ref_id="CVE-2020-2579" ref_url="https://access.redhat.com/security/cve/CVE-2020-2579" source="CVE"/>
        <reference ref_id="CVE-2020-2580" ref_url="https://access.redhat.com/security/cve/CVE-2020-2580" source="CVE"/>
        <reference ref_id="CVE-2020-2584" ref_url="https://access.redhat.com/security/cve/CVE-2020-2584" source="CVE"/>
        <reference ref_id="CVE-2020-2588" ref_url="https://access.redhat.com/security/cve/CVE-2020-2588" source="CVE"/>
        <reference ref_id="CVE-2020-2589" ref_url="https://access.redhat.com/security/cve/CVE-2020-2589" source="CVE"/>
        <reference ref_id="CVE-2020-2627" ref_url="https://access.redhat.com/security/cve/CVE-2020-2627" source="CVE"/>
        <reference ref_id="CVE-2020-2660" ref_url="https://access.redhat.com/security/cve/CVE-2020-2660" source="CVE"/>
        <reference ref_id="CVE-2020-2679" ref_url="https://access.redhat.com/security/cve/CVE-2020-2679" source="CVE"/>
        <reference ref_id="CVE-2020-2686" ref_url="https://access.redhat.com/security/cve/CVE-2020-2686" source="CVE"/>
        <reference ref_id="CVE-2020-2694" ref_url="https://access.redhat.com/security/cve/CVE-2020-2694" source="CVE"/>
        <reference ref_id="CVE-2020-2752" ref_url="https://access.redhat.com/security/cve/CVE-2020-2752" source="CVE"/>
        <reference ref_id="CVE-2020-2759" ref_url="https://access.redhat.com/security/cve/CVE-2020-2759" source="CVE"/>
        <reference ref_id="CVE-2020-2760" ref_url="https://access.redhat.com/security/cve/CVE-2020-2760" source="CVE"/>
        <reference ref_id="CVE-2020-2761" ref_url="https://access.redhat.com/security/cve/CVE-2020-2761" source="CVE"/>
        <reference ref_id="CVE-2020-2762" ref_url="https://access.redhat.com/security/cve/CVE-2020-2762" source="CVE"/>
        <reference ref_id="CVE-2020-2763" ref_url="https://access.redhat.com/security/cve/CVE-2020-2763" source="CVE"/>
        <reference ref_id="CVE-2020-2765" ref_url="https://access.redhat.com/security/cve/CVE-2020-2765" source="CVE"/>
        <reference ref_id="CVE-2020-2770" ref_url="https://access.redhat.com/security/cve/CVE-2020-2770" source="CVE"/>
        <reference ref_id="CVE-2020-2774" ref_url="https://access.redhat.com/security/cve/CVE-2020-2774" source="CVE"/>
        <reference ref_id="CVE-2020-2779" ref_url="https://access.redhat.com/security/cve/CVE-2020-2779" source="CVE"/>
        <reference ref_id="CVE-2020-2780" ref_url="https://access.redhat.com/security/cve/CVE-2020-2780" source="CVE"/>
        <reference ref_id="CVE-2020-2804" ref_url="https://access.redhat.com/security/cve/CVE-2020-2804" source="CVE"/>
        <reference ref_id="CVE-2020-2812" ref_url="https://access.redhat.com/security/cve/CVE-2020-2812" source="CVE"/>
        <reference ref_id="CVE-2020-2814" ref_url="https://access.redhat.com/security/cve/CVE-2020-2814" source="CVE"/>
        <reference ref_id="CVE-2020-2853" ref_url="https://access.redhat.com/security/cve/CVE-2020-2853" source="CVE"/>
        <reference ref_id="CVE-2020-2892" ref_url="https://access.redhat.com/security/cve/CVE-2020-2892" source="CVE"/>
        <reference ref_id="CVE-2020-2893" ref_url="https://access.redhat.com/security/cve/CVE-2020-2893" source="CVE"/>
        <reference ref_id="CVE-2020-2895" ref_url="https://access.redhat.com/security/cve/CVE-2020-2895" source="CVE"/>
        <reference ref_id="CVE-2020-2896" ref_url="https://access.redhat.com/security/cve/CVE-2020-2896" source="CVE"/>
        <reference ref_id="CVE-2020-2897" ref_url="https://access.redhat.com/security/cve/CVE-2020-2897" source="CVE"/>
        <reference ref_id="CVE-2020-2898" ref_url="https://access.redhat.com/security/cve/CVE-2020-2898" source="CVE"/>
        <reference ref_id="CVE-2020-2901" ref_url="https://access.redhat.com/security/cve/CVE-2020-2901" source="CVE"/>
        <reference ref_id="CVE-2020-2903" ref_url="https://access.redhat.com/security/cve/CVE-2020-2903" source="CVE"/>
        <reference ref_id="CVE-2020-2904" ref_url="https://access.redhat.com/security/cve/CVE-2020-2904" source="CVE"/>
        <reference ref_id="CVE-2020-2921" ref_url="https://access.redhat.com/security/cve/CVE-2020-2921" source="CVE"/>
        <reference ref_id="CVE-2020-2922" ref_url="https://access.redhat.com/security/cve/CVE-2020-2922" source="CVE"/>
        <reference ref_id="CVE-2020-2923" ref_url="https://access.redhat.com/security/cve/CVE-2020-2923" source="CVE"/>
        <reference ref_id="CVE-2020-2924" ref_url="https://access.redhat.com/security/cve/CVE-2020-2924" source="CVE"/>
        <reference ref_id="CVE-2020-2925" ref_url="https://access.redhat.com/security/cve/CVE-2020-2925" source="CVE"/>
        <reference ref_id="CVE-2020-2926" ref_url="https://access.redhat.com/security/cve/CVE-2020-2926" source="CVE"/>
        <reference ref_id="CVE-2020-2928" ref_url="https://access.redhat.com/security/cve/CVE-2020-2928" source="CVE"/>
        <reference ref_id="CVE-2020-2930" ref_url="https://access.redhat.com/security/cve/CVE-2020-2930" source="CVE"/>
        <reference ref_id="CVE-2021-1998" ref_url="https://access.redhat.com/security/cve/CVE-2021-1998" source="CVE"/>
        <reference ref_id="CVE-2021-2006" ref_url="https://access.redhat.com/security/cve/CVE-2021-2006" source="CVE"/>
        <reference ref_id="CVE-2021-2007" ref_url="https://access.redhat.com/security/cve/CVE-2021-2007" source="CVE"/>
        <reference ref_id="CVE-2021-2009" ref_url="https://access.redhat.com/security/cve/CVE-2021-2009" source="CVE"/>
        <reference ref_id="CVE-2021-2012" ref_url="https://access.redhat.com/security/cve/CVE-2021-2012" source="CVE"/>
        <reference ref_id="CVE-2021-2016" ref_url="https://access.redhat.com/security/cve/CVE-2021-2016" source="CVE"/>
        <reference ref_id="CVE-2021-2019" ref_url="https://access.redhat.com/security/cve/CVE-2021-2019" source="CVE"/>
        <reference ref_id="CVE-2021-2020" ref_url="https://access.redhat.com/security/cve/CVE-2021-2020" source="CVE"/>
        <reference ref_id="CVE-2021-2144" ref_url="https://access.redhat.com/security/cve/CVE-2021-2144" source="CVE"/>
        <reference ref_id="CVE-2021-2160" ref_url="https://access.redhat.com/security/cve/CVE-2021-2160" source="CVE"/>
        <description>MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

The following packages have been upgraded to a later upstream version: mysql (8.0.21).

Security Fix(es):

* mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702)

* mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957)

* mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634)

* mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925)

* mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567)

* mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725)

* mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011)

* mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580)

* mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619)

* mysql: Server: Connection unspecified vulnerability (CVE-2019-3009)

* mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632)

* mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620)

* mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574)

* mysql: Server: Logging unspecified vulnerability (CVE-2020-2770)

* mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804)

* mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812)

* mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694)

* mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898)

* mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903)

* mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921)

* mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926)

* mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553)

* mysql: Server: UDF unspecified vulnerability (CVE-2020-14576)

* mysql: Server: JSON unspecified vulnerability (CVE-2020-14624)

* mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631)

* mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651)

* mysql: Server: Locking unspecified vulnerability (CVE-2020-14656)

* mysql: Information Schema unspecified vulnerability (CVE-2019-2911)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-14"/>
          <updated date="2020-09-14"/>
          <cve cvss3="2.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-2911" impact="low" public="20191015">CVE-2019-2911</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2914" impact="moderate" public="20191015">CVE-2019-2914</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2938" impact="moderate" public="20191015">CVE-2019-2938</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2946" impact="moderate" public="20191015">CVE-2019-2946</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2957" impact="moderate" public="20191015">CVE-2019-2957</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2960" impact="moderate" public="20191015">CVE-2019-2960</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2963" impact="moderate" public="20191015">CVE-2019-2963</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2966" impact="moderate" public="20191015">CVE-2019-2966</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2967" impact="moderate" public="20191015">CVE-2019-2967</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2968" impact="moderate" public="20191015">CVE-2019-2968</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2974" impact="moderate" public="20191015">CVE-2019-2974</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2982" impact="moderate" public="20191015">CVE-2019-2982</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2991" impact="moderate" public="20191015">CVE-2019-2991</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2993" impact="moderate" public="20191015">CVE-2019-2993</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2997" impact="moderate" public="20191015">CVE-2019-2997</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2998" impact="moderate" public="20191015">CVE-2019-2998</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-3004" impact="moderate" public="20191015">CVE-2019-3004</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-3009" impact="moderate" public="20191015">CVE-2019-3009</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-3011" impact="moderate" public="20191015">CVE-2019-3011</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-3018" impact="moderate" public="20191015">CVE-2019-3018</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14539" impact="moderate" public="20200714">CVE-2020-14539</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14540" impact="moderate" public="20200714">CVE-2020-14540</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14547" impact="moderate" public="20200714">CVE-2020-14547</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14550" impact="moderate" public="20200714">CVE-2020-14550</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14553" impact="moderate" public="20200714">CVE-2020-14553</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14559" impact="moderate" public="20200714">CVE-2020-14559</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14567" impact="moderate" public="20200714">CVE-2020-14567</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14568" impact="moderate" public="20200714">CVE-2020-14568</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14575" impact="moderate" public="20200714">CVE-2020-14575</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14576" impact="moderate" public="20200714">CVE-2020-14576</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14586" impact="moderate" public="20200714">CVE-2020-14586</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14597" impact="moderate" public="20200714">CVE-2020-14597</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14614" impact="moderate" public="20200714">CVE-2020-14614</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14619" impact="moderate" public="20200714">CVE-2020-14619</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14620" impact="moderate" public="20200714">CVE-2020-14620</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14623" impact="moderate" public="20200714">CVE-2020-14623</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14624" impact="moderate" public="20200714">CVE-2020-14624</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14631" impact="moderate" public="20200714">CVE-2020-14631</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14632" impact="moderate" public="20200714">CVE-2020-14632</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14633" impact="low" public="20200714">CVE-2020-14633</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14634" impact="low" public="20200714">CVE-2020-14634</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14641" impact="moderate" public="20200714">CVE-2020-14641</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14643" impact="moderate" public="20200714">CVE-2020-14643</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14651" impact="moderate" public="20200714">CVE-2020-14651</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14654" impact="moderate" public="20200714">CVE-2020-14654</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14656" impact="moderate" public="20200714">CVE-2020-14656</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14663" impact="important" public="20200714">CVE-2020-14663</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14678" impact="important" public="20200714">CVE-2020-14678</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14680" impact="moderate" public="20200714">CVE-2020-14680</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14697" impact="important" public="20200714">CVE-2020-14697</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14702" impact="moderate" public="20200714">CVE-2020-14702</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14725" impact="moderate" public="20200714">CVE-2020-14725</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14799" impact="moderate" public="20201020">CVE-2020-14799</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2570" impact="low" public="20200205">CVE-2020-2570</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2573" impact="low" public="20200205">CVE-2020-2573</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2574" impact="low" public="20200205">CVE-2020-2574</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2577" impact="moderate" public="20200114">CVE-2020-2577</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2579" impact="moderate" public="20200114">CVE-2020-2579</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2580" impact="moderate" public="20200114">CVE-2020-2580</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-2584" impact="moderate" public="20200114">CVE-2020-2584</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2588" impact="moderate" public="20200114">CVE-2020-2588</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2589" impact="moderate" public="20200114">CVE-2020-2589</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2627" impact="moderate" public="20200114">CVE-2020-2627</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2660" impact="moderate" public="20200114">CVE-2020-2660</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2679" impact="moderate" public="20200114">CVE-2020-2679</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2686" impact="moderate" public="20200114">CVE-2020-2686</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-2694" impact="low" public="20200114">CVE-2020-2694</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2752" impact="moderate" public="20200414">CVE-2020-2752</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2759" impact="moderate" public="20200414">CVE-2020-2759</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2760" impact="moderate" public="20200414">CVE-2020-2760</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2761" impact="moderate" public="20200414">CVE-2020-2761</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2762" impact="moderate" public="20200414">CVE-2020-2762</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2763" impact="moderate" public="20200414">CVE-2020-2763</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2765" impact="moderate" public="20200414">CVE-2020-2765</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2770" impact="moderate" public="20200414">CVE-2020-2770</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2774" impact="moderate" public="20200414">CVE-2020-2774</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2779" impact="moderate" public="20200414">CVE-2020-2779</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2780" impact="moderate" public="20200414">CVE-2020-2780</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2804" impact="moderate" public="20200414">CVE-2020-2804</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2812" impact="moderate" public="20200414">CVE-2020-2812</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2814" impact="moderate" public="20200414">CVE-2020-2814</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2853" impact="moderate" public="20200414">CVE-2020-2853</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2892" impact="moderate" public="20200414">CVE-2020-2892</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2893" impact="moderate" public="20200414">CVE-2020-2893</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2895" impact="moderate" public="20200414">CVE-2020-2895</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2896" impact="moderate" public="20200414">CVE-2020-2896</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2897" impact="moderate" public="20200414">CVE-2020-2897</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2898" impact="moderate" public="20200414">CVE-2020-2898</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2901" impact="moderate" public="20200414">CVE-2020-2901</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2903" impact="moderate" public="20200414">CVE-2020-2903</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2904" impact="moderate" public="20200414">CVE-2020-2904</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2921" impact="moderate" public="20200414">CVE-2020-2921</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-2922" impact="moderate" public="20200414">CVE-2020-2922</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2923" impact="moderate" public="20200414">CVE-2020-2923</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2924" impact="moderate" public="20200414">CVE-2020-2924</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2925" impact="moderate" public="20200414">CVE-2020-2925</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2926" impact="moderate" public="20200414">CVE-2020-2926</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2928" impact="moderate" public="20200414">CVE-2020-2928</cve>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2930" impact="moderate" public="20200414">CVE-2020-2930</cve>
          <cve cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://access.redhat.com/security/cve/CVE-2021-1998" impact="low" public="20210119">CVE-2021-1998</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2006" impact="moderate" public="20210119">CVE-2021-2006</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2021-2007" impact="low" public="20210119">CVE-2021-2007</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2009" impact="moderate" public="20210119">CVE-2021-2009</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2012" impact="moderate" public="20210119">CVE-2021-2012</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2016" impact="moderate" public="20210119">CVE-2021-2016</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2021-2019" impact="low" public="20210119">CVE-2021-2019</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2020" impact="moderate" public="20210119">CVE-2021-2020</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2144" impact="important" public="20210420">CVE-2021-2144</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2160" impact="moderate" public="20210420">CVE-2021-2160</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764675" id="1764675">CVE-2019-2911 mysql: Information Schema unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764676" id="1764676">CVE-2019-2914 mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764680" id="1764680">CVE-2019-2938 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764681" id="1764681">CVE-2019-2946 mysql: Server: PS unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764684" id="1764684">CVE-2019-2957 mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764685" id="1764685">CVE-2019-2960 mysql: Server: Replication unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764686" id="1764686">CVE-2019-2963 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764687" id="1764687">CVE-2019-2966 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764688" id="1764688">CVE-2019-2967 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764689" id="1764689">CVE-2019-2968 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764691" id="1764691">CVE-2019-2974 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764692" id="1764692">CVE-2019-2982 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764693" id="1764693">CVE-2019-2991 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764694" id="1764694">CVE-2019-2993 mysql: Server: C API unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764695" id="1764695">CVE-2019-2997 mysql: Server: DDL unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764696" id="1764696">CVE-2019-2998 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764698" id="1764698">CVE-2019-3004 mysql: Server: Parser unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764699" id="1764699">CVE-2019-3009 mysql: Server: Connection unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764700" id="1764700">CVE-2019-3011 mysql: Server: C API unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764701" id="1764701">CVE-2019-3018 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796880" id="1796880">CVE-2020-2577 mysql: InnoDB unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796881" id="1796881">CVE-2020-2579 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796882" id="1796882">CVE-2020-2580 mysql: Server: DDL unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796883" id="1796883">CVE-2020-2584 mysql: Server: Options unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796884" id="1796884">CVE-2020-2588 mysql: Server: DML unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796885" id="1796885">CVE-2020-2589 mysql: InnoDB unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796886" id="1796886">CVE-2020-2660 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796887" id="1796887">CVE-2020-2679 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796888" id="1796888">CVE-2020-2686 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796889" id="1796889">CVE-2020-2694 mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1796905" id="1796905">CVE-2020-2627 mysql: Server: Parser unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798559" id="1798559">CVE-2020-2570 mysql: C API unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798576" id="1798576">CVE-2020-2573 mysql: C API unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798587" id="1798587">CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830048" id="1830048">CVE-2020-2759 mysql: Server: Replication unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830049" id="1830049">CVE-2020-2761 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830050" id="1830050">CVE-2020-2762 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830051" id="1830051">CVE-2020-2763 mysql: Server: Replication unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830052" id="1830052">CVE-2020-2765 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830053" id="1830053">CVE-2020-2770 mysql: Server: Logging unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830054" id="1830054">CVE-2020-2774 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830055" id="1830055">CVE-2020-2779 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830056" id="1830056">CVE-2020-2780 mysql: Server: DML unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830058" id="1830058">CVE-2020-2804 mysql: Server: Memcached unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830059" id="1830059">CVE-2020-2812 mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830060" id="1830060">CVE-2020-2814 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830061" id="1830061">CVE-2020-2853 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830062" id="1830062">CVE-2020-2892 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830064" id="1830064">CVE-2020-2893 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830066" id="1830066">CVE-2020-2895 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830067" id="1830067">CVE-2020-2896 mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830068" id="1830068">CVE-2020-2897 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830069" id="1830069">CVE-2020-2898 mysql: Server: Charsets unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830070" id="1830070">CVE-2020-2901 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830071" id="1830071">CVE-2020-2903 mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830072" id="1830072">CVE-2020-2904 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830073" id="1830073">CVE-2020-2921 mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830074" id="1830074">CVE-2020-2923 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830075" id="1830075">CVE-2020-2924 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830076" id="1830076">CVE-2020-2925 mysql: Server: PS unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830077" id="1830077">CVE-2020-2926 mysql: Server: Group Replication GCS unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830078" id="1830078">CVE-2020-2928 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830079" id="1830079">CVE-2020-2930 mysql: Server: Parser unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830082" id="1830082">CVE-2020-2760 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835849" id="1835849">CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835850" id="1835850">CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865945" id="1865945">CVE-2020-14539 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865947" id="1865947">CVE-2020-14540 mysql: Server: DML unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865948" id="1865948">CVE-2020-14547 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865949" id="1865949">CVE-2020-14550 mysql: C API unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865950" id="1865950">CVE-2020-14553 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865951" id="1865951">CVE-2020-14559 mysql: Server: Information Schema unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865952" id="1865952">CVE-2020-14567 mysql: Server: Replication unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865953" id="1865953">CVE-2020-14568 mysql: InnoDB unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865954" id="1865954">CVE-2020-14575 mysql: Server: DML unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865955" id="1865955">CVE-2020-14576 mysql: Server: UDF unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865956" id="1865956">CVE-2020-14586 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865958" id="1865958">CVE-2020-14597 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865959" id="1865959">CVE-2020-14614 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865960" id="1865960">CVE-2020-14619 mysql: Server: Parser unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865961" id="1865961">CVE-2020-14620 mysql: Server: DML unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865962" id="1865962">CVE-2020-14623 mysql: InnoDB unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865963" id="1865963">CVE-2020-14624 mysql: Server: JSON unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865964" id="1865964">CVE-2020-14631 mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865965" id="1865965">CVE-2020-14632 mysql: Server: Options unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865966" id="1865966">CVE-2020-14633 mysql: InnoDB unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865967" id="1865967">CVE-2020-14634 mysql: InnoDB unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865968" id="1865968">CVE-2020-14641 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865969" id="1865969">CVE-2020-14643 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865970" id="1865970">CVE-2020-14654 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865971" id="1865971">CVE-2020-14656 mysql: Server: Locking unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865972" id="1865972">CVE-2020-14663 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865973" id="1865973">CVE-2020-14678 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865974" id="1865974">CVE-2020-14680 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865975" id="1865975">CVE-2020-14697 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865976" id="1865976">CVE-2020-14702 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865977" id="1865977">CVE-2020-14725 mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865982" id="1865982">CVE-2020-14651 mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890752" id="1890752">CVE-2020-14799 mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922378" id="1922378">CVE-2021-1998 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922381" id="1922381">CVE-2021-2006 mysql: C API unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922382" id="1922382">CVE-2021-2007 mysql: C API unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922386" id="1922386">CVE-2021-2019 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922387" id="1922387">CVE-2021-2020 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922420" id="1922420">CVE-2021-2016 mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922422" id="1922422">CVE-2021-2012 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922424" id="1922424">CVE-2021-2009 mysql: Server: Security: Roles unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1951749" id="1951749">CVE-2021-2144 mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1952806" id="1952806">CVE-2021-2160 mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module mysql:8.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192511021"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mecab is earlier than 0:0.996-1.module_el8.4.0+2532+b8928c02.9" test_ref="oval:org.almalinux.alsa:tst:201925110011"/>
              <criterion comment="mecab is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab is earlier than 0:0.996-1.module_el8.5.0+33+8bc5f36a.9" test_ref="oval:org.almalinux.alsa:tst:201925110012"/>
              <criterion comment="mecab is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic is earlier than 0:2.7.0.20070801-16.module_el8.4.0+2532+b8928c02" test_ref="oval:org.almalinux.alsa:tst:201925110031"/>
              <criterion comment="mecab-ipadic is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic is earlier than 0:2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a" test_ref="oval:org.almalinux.alsa:tst:201925110032"/>
              <criterion comment="mecab-ipadic is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic-EUCJP is earlier than 0:2.7.0.20070801-16.module_el8.4.0+2532+b8928c02" test_ref="oval:org.almalinux.alsa:tst:201925110051"/>
              <criterion comment="mecab-ipadic-EUCJP is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mecab-ipadic-EUCJP is earlier than 0:2.7.0.20070801-16.module_el8.5.0+33+8bc5f36a" test_ref="oval:org.almalinux.alsa:tst:201925110052"/>
              <criterion comment="mecab-ipadic-EUCJP is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320071"/>
              <criterion comment="mysql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320072"/>
              <criterion comment="mysql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320073"/>
              <criterion comment="mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-common is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320091"/>
              <criterion comment="mysql-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-common is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320092"/>
              <criterion comment="mysql-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-common is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320093"/>
              <criterion comment="mysql-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-devel is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320111"/>
              <criterion comment="mysql-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-devel is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320112"/>
              <criterion comment="mysql-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-devel is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320113"/>
              <criterion comment="mysql-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-errmsg is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320131"/>
              <criterion comment="mysql-errmsg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-errmsg is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320132"/>
              <criterion comment="mysql-errmsg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-errmsg is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320133"/>
              <criterion comment="mysql-errmsg is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-libs is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320151"/>
              <criterion comment="mysql-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-libs is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320152"/>
              <criterion comment="mysql-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-libs is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320153"/>
              <criterion comment="mysql-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-server is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320171"/>
              <criterion comment="mysql-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-server is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320172"/>
              <criterion comment="mysql-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-server is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320173"/>
              <criterion comment="mysql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-test is earlier than 0:8.0.21-1.module_el8.3.0+2049+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320191"/>
              <criterion comment="mysql-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-test is earlier than 0:8.0.21-1.module_el8.4.0+2259+47abd494" test_ref="oval:org.almalinux.alsa:tst:202037320192"/>
              <criterion comment="mysql-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192511020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mysql-test is earlier than 0:8.0.21-1.module_el8.2.0+493+63b41e36" test_ref="oval:org.almalinux.alsa:tst:202037320193"/>
              <criterion comment="mysql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201925110202"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20203832" version="636">
      <metadata>
        <title>ALSA-2020:3832: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:3832" ref_url="https://errata.almalinux.org/8/ALSA-2020-3832.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:3832" ref_url="https://access.redhat.com/errata/RHSA-2020:3832" source="RHSA"/>
        <reference ref_id="CVE-2020-15673" ref_url="https://access.redhat.com/security/cve/CVE-2020-15673" source="CVE"/>
        <reference ref_id="CVE-2020-15676" ref_url="https://access.redhat.com/security/cve/CVE-2020-15676" source="CVE"/>
        <reference ref_id="CVE-2020-15677" ref_url="https://access.redhat.com/security/cve/CVE-2020-15677" source="CVE"/>
        <reference ref_id="CVE-2020-15678" ref_url="https://access.redhat.com/security/cve/CVE-2020-15678" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.3.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673)

* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676)

* Mozilla: Download origin spoofing via redirect (CVE-2020-15677)

* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-24"/>
          <updated date="2020-09-24"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15673" impact="important" public="20200922">CVE-2020-15673</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-15676" impact="moderate" public="20200922">CVE-2020-15676</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2020-15677" impact="moderate" public="20200922">CVE-2020-15677</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-15678" impact="moderate" public="20200922">CVE-2020-15678</cve>
          <bugzilla href="https://bugzilla.redhat.com/1881664" id="1881664">CVE-2020-15677 Mozilla: Download origin spoofing via redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881665" id="1881665">CVE-2020-15676 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881666" id="1881666">CVE-2020-15678 Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881667" id="1881667">CVE-2020-15673 Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.3.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203832001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204059" version="637">
      <metadata>
        <title>ALSA-2020:4059: virt:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4059" ref_url="https://errata.almalinux.org/8/ALSA-2020-4059.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4059" ref_url="https://access.redhat.com/errata/RHSA-2020:4059" source="RHSA"/>
        <reference ref_id="CVE-2020-10756" ref_url="https://access.redhat.com/security/cve/CVE-2020-10756" source="CVE"/>
        <reference ref_id="CVE-2020-14364" ref_url="https://access.redhat.com/security/cve/CVE-2020-14364" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364)

* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-09-29"/>
          <updated date="2020-09-29"/>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-10756" impact="moderate" public="20200527">CVE-2020-10756</cve>
          <cve cvss3="5.0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-125-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-14364" impact="important" public="20200824:1200">CVE-2020-14364</cve>
          <bugzilla href="https://bugzilla.redhat.com/1835986" id="1835986">CVE-2020-10756 QEMU: slirp: networking out-of-bounds read information disclosure vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1869201" id="1869201">CVE-2020-14364 QEMU: usb: out-of-bounds r/w access issue while processing usb packets</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20171214-6.gitfa98132.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450011"/>
                  <criterion comment="SLOF is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450031"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450051"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740071"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740091"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740111"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740131"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740151"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740171"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740231"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740251"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740271"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740331"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740351"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740371"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740391"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450411"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740431"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740511"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740531"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740551"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740571"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740591"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740611"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740631"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740651"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740671"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740691"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740711"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740731"/>
                  <criterion comment="libvirt-daemon-driver-qemu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740751"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740771"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740791"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740811"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740831"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740851"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740871"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740891"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740911"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740931"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740951"/>
                  <criterion comment="libvirt-daemon-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750982"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933450971"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027740991"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741011"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741031"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741051"/>
                  <criterion comment="libvirt-lock-sanlock is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741071"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741091"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451111"/>
                  <criterion comment="nbdkit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451131"/>
                  <criterion comment="nbdkit-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751162"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451151"/>
                  <criterion comment="nbdkit-basic-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451171"/>
                  <criterion comment="nbdkit-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451191"/>
                  <criterion comment="nbdkit-example-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751222"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-gzip is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451211"/>
                  <criterion comment="nbdkit-plugin-gzip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python-common is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451231"/>
                  <criterion comment="nbdkit-plugin-python-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-python3 is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451251"/>
                  <criterion comment="nbdkit-plugin-python3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-vddk is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451271"/>
                  <criterion comment="nbdkit-plugin-vddk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751302"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-plugin-xz is earlier than 0:1.4.2-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451291"/>
                  <criterion comment="nbdkit-plugin-xz is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751322"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741371"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451391"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451411"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451431"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741451"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451471"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591491"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591511"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591531"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591551"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591571"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591591"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591611"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591631"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591651"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040591671"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451691"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741711"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451731"/>
                  <criterion comment="seabios is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751762"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451751"/>
                  <criterion comment="seabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751782"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.11.1-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451771"/>
                  <criterion comment="seavgabios-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751802"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451831"/>
                  <criterion comment="supermin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751862"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-9.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451851"/>
                  <criterion comment="supermin-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741871"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741891"/>
                  <criterion comment="virt-v2v is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751942"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451941"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451951"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.0-4.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933451961"/>
                  <criterion comment="libguestfs-winsupport is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741981"/>
                  <criterion comment="libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027741991"/>
                  <criterion comment="libvirt-admin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742001"/>
                  <criterion comment="libvirt-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742011"/>
                  <criterion comment="libvirt-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750602"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742021"/>
                  <criterion comment="libvirt-daemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742031"/>
                  <criterion comment="libvirt-daemon-config-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742041"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742051"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742061"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742071"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742081"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742091"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750782"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742101"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750802"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742111"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750822"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742121"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750842"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742131"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750882"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742141"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742151"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750922"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742161"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750942"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742171"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750962"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.2.0-3.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452201"/>
                  <criterion comment="libvirt-dbus is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742191"/>
                  <criterion comment="libvirt-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742201"/>
                  <criterion comment="libvirt-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742211"/>
                  <criterion comment="libvirt-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:4.5.0-42.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742221"/>
                  <criterion comment="libvirt-nss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452281"/>
                  <criterion comment="ocaml-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452292"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452301"/>
                  <criterion comment="ocaml-hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452312"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742301"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.38.4-15.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:202027742321"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:4.5.0-5.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452361"/>
                  <criterion comment="perl-Sys-Virt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751422"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452371"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452381"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:4.5.0-2.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452391"/>
                  <criterion comment="python3-libvirt is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:2.12.0-99.module_el8.2.0+524+f765f7e0.4" test_ref="oval:org.almalinux.alsa:tst:202040592381"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.15-7.module_el8.2.0+320+13f867d7" test_ref="oval:org.almalinux.alsa:tst:201933452421"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204155" version="637">
      <metadata>
        <title>ALSA-2020:4155: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4155" ref_url="https://errata.almalinux.org/8/ALSA-2020-4155.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4155" ref_url="https://access.redhat.com/errata/RHSA-2020:4155" source="RHSA"/>
        <reference ref_id="CVE-2020-15673" ref_url="https://access.redhat.com/security/cve/CVE-2020-15673" source="CVE"/>
        <reference ref_id="CVE-2020-15676" ref_url="https://access.redhat.com/security/cve/CVE-2020-15676" source="CVE"/>
        <reference ref_id="CVE-2020-15677" ref_url="https://access.redhat.com/security/cve/CVE-2020-15677" source="CVE"/>
        <reference ref_id="CVE-2020-15678" ref_url="https://access.redhat.com/security/cve/CVE-2020-15678" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.3.1.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673)

* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676)

* Mozilla: Download origin spoofing via redirect (CVE-2020-15677)

* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-01"/>
          <updated date="2020-10-01"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15673" impact="important" public="20200922">CVE-2020-15673</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-15676" impact="moderate" public="20200922">CVE-2020-15676</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2020-15677" impact="moderate" public="20200922">CVE-2020-15677</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-15678" impact="moderate" public="20200922">CVE-2020-15678</cve>
          <bugzilla href="https://bugzilla.redhat.com/1881664" id="1881664">CVE-2020-15677 Mozilla: Download origin spoofing via redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881665" id="1881665">CVE-2020-15676 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881666" id="1881666">CVE-2020-15678 Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881667" id="1881667">CVE-2020-15673 Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.3.1-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204155001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204186" version="636">
      <metadata>
        <title>ALSA-2020:4186: spice and spice-gtk security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4186" ref_url="https://errata.almalinux.org/8/ALSA-2020-4186.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4186" ref_url="https://access.redhat.com/errata/RHSA-2020:4186" source="RHSA"/>
        <reference ref_id="CVE-2020-14355" ref_url="https://access.redhat.com/security/cve/CVE-2020-14355" source="CVE"/>
        <description>The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.

The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

Security Fix(es):

* spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-06"/>
          <updated date="2020-10-06"/>
          <cve cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-14355" impact="important" public="20201006:1200">CVE-2020-14355</cve>
          <bugzilla href="https://bugzilla.redhat.com/1868435" id="1868435">CVE-2020-14355 spice: multiple buffer overflow vulnerabilities in QUIC decoding code</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="spice-server is earlier than 0:0.14.2-1.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20204186001"/>
              <criterion comment="spice-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-server-devel is earlier than 0:0.14.2-1.el8_2.1" test_ref="oval:org.almalinux.alsa:tst:20204186003"/>
              <criterion comment="spice-server-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-glib is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186005"/>
              <criterion comment="spice-glib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-glib-devel is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186007"/>
              <criterion comment="spice-glib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-gtk is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186009"/>
              <criterion comment="spice-gtk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-gtk-tools is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186011"/>
              <criterion comment="spice-gtk-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-gtk3 is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186013"/>
              <criterion comment="spice-gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-gtk3-devel is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186015"/>
              <criterion comment="spice-gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="spice-gtk3-vala is earlier than 0:0.37-1.el8_2.2" test_ref="oval:org.almalinux.alsa:tst:20204186017"/>
              <criterion comment="spice-gtk3-vala is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204186018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204272" version="639">
      <metadata>
        <title>ALSA-2020:4272: nodejs:12 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4272" ref_url="https://errata.almalinux.org/8/ALSA-2020-4272.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4272" ref_url="https://access.redhat.com/errata/RHSA-2020:4272" source="RHSA"/>
        <reference ref_id="CVE-2020-15095" ref_url="https://access.redhat.com/security/cve/CVE-2020-15095" source="CVE"/>
        <reference ref_id="CVE-2020-8116" ref_url="https://access.redhat.com/security/cve/CVE-2020-8116" source="CVE"/>
        <reference ref_id="CVE-2020-8201" ref_url="https://access.redhat.com/security/cve/CVE-2020-8201" source="CVE"/>
        <reference ref_id="CVE-2020-8252" ref_url="https://access.redhat.com/security/cve/CVE-2020-8252" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (12.18.4).

Security Fix(es):

* nodejs-dot-prop: prototype pollution (CVE-2020-8116)

* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)

* npm: Sensitive information exposure through logs (CVE-2020-15095)

* libuv: buffer overflow in realpath (CVE-2020-8252)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* The nodejs:12/development module is not installable (BZ#1883966)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-19"/>
          <updated date="2020-10-19"/>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-532" href="https://access.redhat.com/security/cve/CVE-2020-15095" impact="moderate" public="20200707">CVE-2020-15095</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-8116" impact="moderate" public="20200128">CVE-2020-8116</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-8201" impact="moderate" public="20200915">CVE-2020-8201</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-131-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-8252" impact="low" public="20200915">CVE-2020-8252</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856875" id="1856875">CVE-2020-15095 npm: sensitive information exposure through logs</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1868196" id="1868196">CVE-2020-8116 nodejs-dot-prop: prototype pollution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879311" id="1879311">CVE-2020-8201 nodejs: HTTP request smuggling due to CR-to-Hyphen conversion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879315" id="1879315">CVE-2020-8252 libuv: buffer overflow in realpath</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:12.18.4-2.module_el8.2.0+530+cb1b9c8b" test_ref="oval:org.almalinux.alsa:tst:202042720011"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:12.18.4-2.module_el8.2.0+530+cb1b9c8b" test_ref="oval:org.almalinux.alsa:tst:202042720031"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:12.18.4-2.module_el8.2.0+530+cb1b9c8b" test_ref="oval:org.almalinux.alsa:tst:202042720051"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:12.18.4-2.module_el8.2.0+530+cb1b9c8b" test_ref="oval:org.almalinux.alsa:tst:202042720071"/>
              <criterion comment="nodejs-full-i18n is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202028480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.6-1.12.18.4.2.module_el8.2.0+530+cb1b9c8b" test_ref="oval:org.almalinux.alsa:tst:202042720131"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204286" version="643">
      <metadata>
        <title>ALSA-2020:4286: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4286" ref_url="https://errata.almalinux.org/8/ALSA-2020-4286.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4286" ref_url="https://access.redhat.com/errata/RHSA-2020:4286" source="RHSA"/>
        <reference ref_id="CVE-2020-12351" ref_url="https://access.redhat.com/security/cve/CVE-2020-12351" source="CVE"/>
        <reference ref_id="CVE-2020-12352" ref_url="https://access.redhat.com/security/cve/CVE-2020-12352" source="CVE"/>
        <reference ref_id="CVE-2020-14331" ref_url="https://access.redhat.com/security/cve/CVE-2020-14331" source="CVE"/>
        <reference ref_id="CVE-2020-14385" ref_url="https://access.redhat.com/security/cve/CVE-2020-14385" source="CVE"/>
        <reference ref_id="CVE-2020-14386" ref_url="https://access.redhat.com/security/cve/CVE-2020-14386" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)

* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)

* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)

* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)

* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [mlx5] stale ethtool steering rules remain after moving back to legacy mode (BZ#1857777)

* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)

* take into account GSO and fragmented packets in execute_check_pkt_len action (BZ#1860169)

* RHEL8.1 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1866371)

* RHEL8.3 Pre-Beta - smc: SMC connections hang with later-level implementations (BZ#1866390)

* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() (BZ#1867174)

* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)

* RHEL8.1 - s390/pci: Fix unexpected write combine on resource (BZ#1869276)

* dm multipath: fix spurious failures during IO completion [EIOP-8345] (BZ#1869386)

* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)

* store_rps_map doesn't accept an empty bitmask, which is required for disabling RPS on a queue (BZ#1870181)

* Memory registration cache data corruption possible, fix requires backporting (BZ#1872424)

* fix another case of wait list corruption for PSM/sdma (BZ#1872766)

* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p "verbs" (BZ#1872771)

* fix mounting and inode number handling on s390x (BZ#1875787)

* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)

* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877528)

* [RHEL-8.3] Kdump failed to start when secure boot enabled:  kexec_file_load failed: Required key not available (BZ#1877530)

* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879988)

* Sleeping or scheduling after sched_cpu_dying() led to "scheduling while atomic" and BUG at kernel/cpu.c:907! (BZ#1880081)

* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882095)

* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-20"/>
          <updated date="2020-10-20"/>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-12351" impact="important" public="20201014">CVE-2020-12351</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-284-&gt;CWE-201" href="https://access.redhat.com/security/cve/CVE-2020-12352" impact="moderate" public="20201014">CVE-2020-12352</cve>
          <cve cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-14331" impact="moderate" public="20200728">CVE-2020-14331</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-131" href="https://access.redhat.com/security/cve/CVE-2020-14385" impact="important" public="20200825:0900">CVE-2020-14385</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787-&gt;CWE-250" href="https://access.redhat.com/security/cve/CVE-2020-14386" impact="important" public="20200903">CVE-2020-14386</cve>
          <bugzilla href="https://bugzilla.redhat.com/1858679" id="1858679">CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1874800" id="1874800">CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1875699" id="1875699">CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1886521" id="1886521">CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1886529" id="1886529">CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-193.28.1.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204286049"/>
            <criterion comment="kernel earlier than 0:4.18.0-193.28.1.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204286050"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286025"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286027"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286029"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286031"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286033"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286035"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286037"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286039"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286041"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286043"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286045"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-193.28.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204286047"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204289" version="638">
      <metadata>
        <title>ALSA-2020:4289: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4289" ref_url="https://errata.almalinux.org/8/ALSA-2020-4289.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4289" ref_url="https://access.redhat.com/errata/RHSA-2020:4289" source="RHSA"/>
        <reference ref_id="CVE-2020-12351" ref_url="https://access.redhat.com/security/cve/CVE-2020-12351" source="CVE"/>
        <reference ref_id="CVE-2020-12352" ref_url="https://access.redhat.com/security/cve/CVE-2020-12352" source="CVE"/>
        <reference ref_id="CVE-2020-14331" ref_url="https://access.redhat.com/security/cve/CVE-2020-14331" source="CVE"/>
        <reference ref_id="CVE-2020-14385" ref_url="https://access.redhat.com/security/cve/CVE-2020-14385" source="CVE"/>
        <reference ref_id="CVE-2020-14386" ref_url="https://access.redhat.com/security/cve/CVE-2020-14386" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)

* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)

* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)

* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)

* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree (BZ#1877921)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-20"/>
          <updated date="2020-10-20"/>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-12351" impact="important" public="20201014">CVE-2020-12351</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-284-&gt;CWE-201" href="https://access.redhat.com/security/cve/CVE-2020-12352" impact="moderate" public="20201014">CVE-2020-12352</cve>
          <cve cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-14331" impact="moderate" public="20200728">CVE-2020-14331</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-131" href="https://access.redhat.com/security/cve/CVE-2020-14385" impact="important" public="20200825:0900">CVE-2020-14385</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787-&gt;CWE-250" href="https://access.redhat.com/security/cve/CVE-2020-14386" impact="important" public="20200903">CVE-2020-14386</cve>
          <bugzilla href="https://bugzilla.redhat.com/1858679" id="1858679">CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1874800" id="1874800">CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1875699" id="1875699">CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1886521" id="1886521">CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1886529" id="1886529">CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.28.1.rt13.77.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204286049"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-193.28.1.rt13.77.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204289026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-193.28.1.rt13.77.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204289023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204305" version="638">
      <metadata>
        <title>ALSA-2020:4305: java-11-openjdk security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4305" ref_url="https://errata.almalinux.org/8/ALSA-2020-4305.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4305" ref_url="https://access.redhat.com/errata/RHSA-2020:4305" source="RHSA"/>
        <reference ref_id="CVE-2020-14779" ref_url="https://access.redhat.com/security/cve/CVE-2020-14779" source="CVE"/>
        <reference ref_id="CVE-2020-14781" ref_url="https://access.redhat.com/security/cve/CVE-2020-14781" source="CVE"/>
        <reference ref_id="CVE-2020-14782" ref_url="https://access.redhat.com/security/cve/CVE-2020-14782" source="CVE"/>
        <reference ref_id="CVE-2020-14792" ref_url="https://access.redhat.com/security/cve/CVE-2020-14792" source="CVE"/>
        <reference ref_id="CVE-2020-14796" ref_url="https://access.redhat.com/security/cve/CVE-2020-14796" source="CVE"/>
        <reference ref_id="CVE-2020-14797" ref_url="https://access.redhat.com/security/cve/CVE-2020-14797" source="CVE"/>
        <reference ref_id="CVE-2020-14803" ref_url="https://access.redhat.com/security/cve/CVE-2020-14803" source="CVE"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)

* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)

* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792)

* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)

* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)

* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)

* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* "java-11-openjdk-headless" scriptlet failed during RHEL7 &gt; RHEL8 upgrade transaction (BZ#1871709)

* java-11-openjdk property java.vendor is "N/A" (BZ#1873390)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-22"/>
          <updated date="2020-10-22"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-14779" impact="low" public="20201020">CVE-2020-14779</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-319" href="https://access.redhat.com/security/cve/CVE-2020-14781" impact="moderate" public="20201020">CVE-2020-14781</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2020-14782" impact="moderate" public="20201020">CVE-2020-14782</cve>
          <cve cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-14792" impact="moderate" public="20201020">CVE-2020-14792</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14796" impact="low" public="20201020">CVE-2020-14796</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14797" impact="moderate" public="20201020">CVE-2020-14797</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-367" href="https://access.redhat.com/security/cve/CVE-2020-14803" impact="moderate" public="20201020">CVE-2020-14803</cve>
          <bugzilla href="https://bugzilla.redhat.com/1889271" id="1889271">CVE-2020-14779 OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889274" id="1889274">CVE-2020-14781 OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889280" id="1889280">CVE-2020-14792 OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889290" id="1889290">CVE-2020-14782 OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889697" id="1889697">CVE-2020-14796 OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889717" id="1889717">CVE-2020-14797 OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889895" id="1889895">CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-11-openjdk is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305001"/>
              <criterion comment="java-11-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-demo is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305003"/>
              <criterion comment="java-11-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-devel is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305005"/>
              <criterion comment="java-11-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-headless is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305007"/>
              <criterion comment="java-11-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305009"/>
              <criterion comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305011"/>
              <criterion comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-jmods is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305013"/>
              <criterion comment="java-11-openjdk-jmods is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-src is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305015"/>
              <criterion comment="java-11-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191518016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-11-openjdk-static-libs is earlier than 1:11.0.9.11-0.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204305017"/>
              <criterion comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202970018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204317" version="637">
      <metadata>
        <title>ALSA-2020:4317: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4317" ref_url="https://errata.almalinux.org/8/ALSA-2020-4317.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4317" ref_url="https://access.redhat.com/errata/RHSA-2020:4317" source="RHSA"/>
        <reference ref_id="CVE-2020-15683" ref_url="https://access.redhat.com/security/cve/CVE-2020-15683" source="CVE"/>
        <reference ref_id="CVE-2020-15969" ref_url="https://access.redhat.com/security/cve/CVE-2020-15969" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.4.0 ESR.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)

* chromium-browser: Use after free in WebRTC (CVE-2020-15969)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-22"/>
          <updated date="2020-10-22"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15683" impact="important" public="20201020">CVE-2020-15683</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-15969" impact="important" public="20201006">CVE-2020-15969</cve>
          <bugzilla href="https://bugzilla.redhat.com/1885885" id="1885885">CVE-2020-15969 chromium-browser: Use after free in WebRTC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889932" id="1889932">CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.4.0-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204317001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204331" version="635">
      <metadata>
        <title>ALSA-2020:4331: kpatch-patch security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4331" ref_url="https://errata.almalinux.org/8/ALSA-2020-4331.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4331" ref_url="https://access.redhat.com/errata/RHSA-2020:4331" source="RHSA"/>
        <reference ref_id="CVE-2020-14385" ref_url="https://access.redhat.com/security/cve/CVE-2020-14385" source="CVE"/>
        <reference ref_id="CVE-2020-14386" ref_url="https://access.redhat.com/security/cve/CVE-2020-14386" source="CVE"/>
        <description>This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)

* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-26"/>
          <updated date="2020-10-26"/>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-131" href="https://access.redhat.com/security/cve/CVE-2020-14385" impact="important" public="20200825:0900">CVE-2020-14385</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787-&gt;CWE-250" href="https://access.redhat.com/security/cve/CVE-2020-14386" impact="important" public="20200903">CVE-2020-14386</cve>
          <bugzilla href="https://bugzilla.redhat.com/1874800" id="1874800">CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1875699" id="1875699">CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202125006"/>
                <criterion comment="kernel version 0:4.18.0-193.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331007"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125001"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.el8" test_ref="oval:org.almalinux.alsa:tst:20202125003"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193 is earlier than 0:1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204331004"/>
                    <criterion comment="kpatch-patch-4_18_0-193 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202125005"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20202567012"/>
                <criterion comment="kernel version 0:4.18.0-193.1.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331013"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567008"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.1.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20202567009"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is earlier than 0:1-5.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331010"/>
                    <criterion comment="kpatch-patch-4_18_0-193_1_2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202567011"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.6.3.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20203073018"/>
                <criterion comment="kernel version 0:4.18.0-193.6.3.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331019"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331014"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.6.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20203073015"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_6_3 is earlier than 0:1-4.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331016"/>
                    <criterion comment="kpatch-patch-4_18_0-193_6_3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203073017"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.13.2.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204331024"/>
                <criterion comment="kernel version 0:4.18.0-193.13.2.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331025"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331020"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.13.2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331021"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_13_2 is earlier than 0:1-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331022"/>
                    <criterion comment="kpatch-patch-4_18_0-193_13_2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204331023"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.14.3.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204331030"/>
                <criterion comment="kernel version 0:4.18.0-193.14.3.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331031"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331026"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.14.3.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331027"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_14_3 is earlier than 0:1-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331028"/>
                    <criterion comment="kpatch-patch-4_18_0-193_14_3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204331029"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criteria operator="OR">
                <criterion comment="kernel version 0:4.18.0-193.19.1.el8_2 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204331036"/>
                <criterion comment="kernel version 0:4.18.0-193.19.1.el8_2 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204331037"/>
              </criteria>
              <criteria operator="AND">
                <criterion comment="kernel version equals 0:4.18.0-193.19.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331032"/>
                <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
                <criteria operator="OR">
                  <criterion comment="kpatch-patch not installed for 0:4.18.0-193.19.1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331033"/>
                  <criteria operator="AND">
                    <criterion comment="kpatch-patch-4_18_0-193_19_1 is earlier than 0:1-2.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204331034"/>
                    <criterion comment="kpatch-patch-4_18_0-193_19_1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204331035"/>
                  </criteria>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204347" version="635">
      <metadata>
        <title>ALSA-2020:4347: java-1.8.0-openjdk security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4347" ref_url="https://errata.almalinux.org/8/ALSA-2020-4347.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4347" ref_url="https://access.redhat.com/errata/RHSA-2020:4347" source="RHSA"/>
        <reference ref_id="CVE-2020-14779" ref_url="https://access.redhat.com/security/cve/CVE-2020-14779" source="CVE"/>
        <reference ref_id="CVE-2020-14781" ref_url="https://access.redhat.com/security/cve/CVE-2020-14781" source="CVE"/>
        <reference ref_id="CVE-2020-14782" ref_url="https://access.redhat.com/security/cve/CVE-2020-14782" source="CVE"/>
        <reference ref_id="CVE-2020-14792" ref_url="https://access.redhat.com/security/cve/CVE-2020-14792" source="CVE"/>
        <reference ref_id="CVE-2020-14796" ref_url="https://access.redhat.com/security/cve/CVE-2020-14796" source="CVE"/>
        <reference ref_id="CVE-2020-14797" ref_url="https://access.redhat.com/security/cve/CVE-2020-14797" source="CVE"/>
        <reference ref_id="CVE-2020-14803" ref_url="https://access.redhat.com/security/cve/CVE-2020-14803" source="CVE"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)

* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)

* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792)

* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)

* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)

* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)

* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-10-26"/>
          <updated date="2020-10-26"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-14779" impact="low" public="20201020">CVE-2020-14779</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-319" href="https://access.redhat.com/security/cve/CVE-2020-14781" impact="moderate" public="20201020">CVE-2020-14781</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2020-14782" impact="moderate" public="20201020">CVE-2020-14782</cve>
          <cve cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-14792" impact="moderate" public="20201020">CVE-2020-14792</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14796" impact="low" public="20201020">CVE-2020-14796</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14797" impact="moderate" public="20201020">CVE-2020-14797</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-367" href="https://access.redhat.com/security/cve/CVE-2020-14803" impact="moderate" public="20201020">CVE-2020-14803</cve>
          <bugzilla href="https://bugzilla.redhat.com/1889271" id="1889271">CVE-2020-14779 OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889274" id="1889274">CVE-2020-14781 OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889280" id="1889280">CVE-2020-14792 OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889290" id="1889290">CVE-2020-14782 OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889697" id="1889697">CVE-2020-14796 OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889717" id="1889717">CVE-2020-14797 OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889895" id="1889895">CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347001"/>
              <criterion comment="java-1.8.0-openjdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-accessibility is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347003"/>
              <criterion comment="java-1.8.0-openjdk-accessibility is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347005"/>
              <criterion comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347007"/>
              <criterion comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347009"/>
              <criterion comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347011"/>
              <criterion comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347013"/>
              <criterion comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.272.b10-1.el8_2" test_ref="oval:org.almalinux.alsa:tst:20204347015"/>
              <criterion comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191146016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204431" version="639">
      <metadata>
        <title>ALSA-2020:4431: kernel security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4431" ref_url="https://errata.almalinux.org/8/ALSA-2020-4431.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4431" ref_url="https://access.redhat.com/errata/RHSA-2020:4431" source="RHSA"/>
        <reference ref_id="CVE-2019-12614" ref_url="https://access.redhat.com/security/cve/CVE-2019-12614" source="CVE"/>
        <reference ref_id="CVE-2019-15917" ref_url="https://access.redhat.com/security/cve/CVE-2019-15917" source="CVE"/>
        <reference ref_id="CVE-2019-15925" ref_url="https://access.redhat.com/security/cve/CVE-2019-15925" source="CVE"/>
        <reference ref_id="CVE-2019-16231" ref_url="https://access.redhat.com/security/cve/CVE-2019-16231" source="CVE"/>
        <reference ref_id="CVE-2019-16233" ref_url="https://access.redhat.com/security/cve/CVE-2019-16233" source="CVE"/>
        <reference ref_id="CVE-2019-18808" ref_url="https://access.redhat.com/security/cve/CVE-2019-18808" source="CVE"/>
        <reference ref_id="CVE-2019-18809" ref_url="https://access.redhat.com/security/cve/CVE-2019-18809" source="CVE"/>
        <reference ref_id="CVE-2019-19046" ref_url="https://access.redhat.com/security/cve/CVE-2019-19046" source="CVE"/>
        <reference ref_id="CVE-2019-19056" ref_url="https://access.redhat.com/security/cve/CVE-2019-19056" source="CVE"/>
        <reference ref_id="CVE-2019-19062" ref_url="https://access.redhat.com/security/cve/CVE-2019-19062" source="CVE"/>
        <reference ref_id="CVE-2019-19063" ref_url="https://access.redhat.com/security/cve/CVE-2019-19063" source="CVE"/>
        <reference ref_id="CVE-2019-19068" ref_url="https://access.redhat.com/security/cve/CVE-2019-19068" source="CVE"/>
        <reference ref_id="CVE-2019-19072" ref_url="https://access.redhat.com/security/cve/CVE-2019-19072" source="CVE"/>
        <reference ref_id="CVE-2019-19319" ref_url="https://access.redhat.com/security/cve/CVE-2019-19319" source="CVE"/>
        <reference ref_id="CVE-2019-19332" ref_url="https://access.redhat.com/security/cve/CVE-2019-19332" source="CVE"/>
        <reference ref_id="CVE-2019-19447" ref_url="https://access.redhat.com/security/cve/CVE-2019-19447" source="CVE"/>
        <reference ref_id="CVE-2019-19524" ref_url="https://access.redhat.com/security/cve/CVE-2019-19524" source="CVE"/>
        <reference ref_id="CVE-2019-19533" ref_url="https://access.redhat.com/security/cve/CVE-2019-19533" source="CVE"/>
        <reference ref_id="CVE-2019-19537" ref_url="https://access.redhat.com/security/cve/CVE-2019-19537" source="CVE"/>
        <reference ref_id="CVE-2019-19543" ref_url="https://access.redhat.com/security/cve/CVE-2019-19543" source="CVE"/>
        <reference ref_id="CVE-2019-19602" ref_url="https://access.redhat.com/security/cve/CVE-2019-19602" source="CVE"/>
        <reference ref_id="CVE-2019-19767" ref_url="https://access.redhat.com/security/cve/CVE-2019-19767" source="CVE"/>
        <reference ref_id="CVE-2019-19770" ref_url="https://access.redhat.com/security/cve/CVE-2019-19770" source="CVE"/>
        <reference ref_id="CVE-2019-20054" ref_url="https://access.redhat.com/security/cve/CVE-2019-20054" source="CVE"/>
        <reference ref_id="CVE-2019-20636" ref_url="https://access.redhat.com/security/cve/CVE-2019-20636" source="CVE"/>
        <reference ref_id="CVE-2019-20812" ref_url="https://access.redhat.com/security/cve/CVE-2019-20812" source="CVE"/>
        <reference ref_id="CVE-2019-9455" ref_url="https://access.redhat.com/security/cve/CVE-2019-9455" source="CVE"/>
        <reference ref_id="CVE-2019-9458" ref_url="https://access.redhat.com/security/cve/CVE-2019-9458" source="CVE"/>
        <reference ref_id="CVE-2020-0305" ref_url="https://access.redhat.com/security/cve/CVE-2020-0305" source="CVE"/>
        <reference ref_id="CVE-2020-0444" ref_url="https://access.redhat.com/security/cve/CVE-2020-0444" source="CVE"/>
        <reference ref_id="CVE-2020-10732" ref_url="https://access.redhat.com/security/cve/CVE-2020-10732" source="CVE"/>
        <reference ref_id="CVE-2020-10751" ref_url="https://access.redhat.com/security/cve/CVE-2020-10751" source="CVE"/>
        <reference ref_id="CVE-2020-10773" ref_url="https://access.redhat.com/security/cve/CVE-2020-10773" source="CVE"/>
        <reference ref_id="CVE-2020-10774" ref_url="https://access.redhat.com/security/cve/CVE-2020-10774" source="CVE"/>
        <reference ref_id="CVE-2020-10942" ref_url="https://access.redhat.com/security/cve/CVE-2020-10942" source="CVE"/>
        <reference ref_id="CVE-2020-11565" ref_url="https://access.redhat.com/security/cve/CVE-2020-11565" source="CVE"/>
        <reference ref_id="CVE-2020-11668" ref_url="https://access.redhat.com/security/cve/CVE-2020-11668" source="CVE"/>
        <reference ref_id="CVE-2020-12465" ref_url="https://access.redhat.com/security/cve/CVE-2020-12465" source="CVE"/>
        <reference ref_id="CVE-2020-12655" ref_url="https://access.redhat.com/security/cve/CVE-2020-12655" source="CVE"/>
        <reference ref_id="CVE-2020-12659" ref_url="https://access.redhat.com/security/cve/CVE-2020-12659" source="CVE"/>
        <reference ref_id="CVE-2020-12770" ref_url="https://access.redhat.com/security/cve/CVE-2020-12770" source="CVE"/>
        <reference ref_id="CVE-2020-12826" ref_url="https://access.redhat.com/security/cve/CVE-2020-12826" source="CVE"/>
        <reference ref_id="CVE-2020-14381" ref_url="https://access.redhat.com/security/cve/CVE-2020-14381" source="CVE"/>
        <reference ref_id="CVE-2020-25641" ref_url="https://access.redhat.com/security/cve/CVE-2020-25641" source="CVE"/>
        <reference ref_id="CVE-2020-8647" ref_url="https://access.redhat.com/security/cve/CVE-2020-8647" source="CVE"/>
        <reference ref_id="CVE-2020-8648" ref_url="https://access.redhat.com/security/cve/CVE-2020-8648" source="CVE"/>
        <reference ref_id="CVE-2020-8649" ref_url="https://access.redhat.com/security/cve/CVE-2020-8649" source="CVE"/>
        <reference ref_id="CVE-2021-3715" ref_url="https://access.redhat.com/security/cve/CVE-2021-3715" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)

* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)

* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)

* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)

* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)

* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)

* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)

* kernel: use-after-free in ext4_put_super (CVE-2019-19447)

* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)

* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)

* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)

* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)

* kernel: use-after-free in debugfs_remove (CVE-2019-19770)

* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)

* kernel: possible use-after-free due to a race condition in cdev_get  (CVE-2020-0305)

* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)

* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)

* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)

* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)

* kernel: SELinux netlink permission check bypass (CVE-2020-10751)

* kernel: out-of-bounds write in mpol_parse_str  (CVE-2020-11565)

* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)

* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)

* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)

* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)

* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)

* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)

* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)

* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)

* kernel: null pointer dereference in dlpar_parse_cc_property  (CVE-2019-12614)

* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)

* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)

* kernel: memory leak in  af9005_identify_state() function (CVE-2019-18809)

* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)

* kernel: memory leak in the crypto_report() function (CVE-2019-19062)

* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)

* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)

* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)

* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)

* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)

* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)

* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)

* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)

* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-12614" impact="low" public="20190603">CVE-2019-12614</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15917" impact="moderate" public="20190904">CVE-2019-15917</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-15925" impact="moderate" public="20190904">CVE-2019-15925</cve>
          <cve cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16231" impact="low" public="20190911">CVE-2019-16231</cve>
          <cve cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16233" impact="low" public="20190909">CVE-2019-16233</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-18808" impact="moderate" public="20191118">CVE-2019-18808</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-18809" impact="low" public="20191127">CVE-2019-18809</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19046" impact="moderate" public="20191118">CVE-2019-19046</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19056" impact="low" public="20191005">CVE-2019-19056</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19062" impact="low" public="20191121">CVE-2019-19062</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19063" impact="low" public="20191121">CVE-2019-19063</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19068" impact="low" public="20191121">CVE-2019-19068</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19072" impact="low" public="20191121">CVE-2019-19072</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-19319" impact="moderate" public="20191127">CVE-2019-19319</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-19332" impact="moderate" public="20191203">CVE-2019-19332</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19447" impact="moderate" public="20191210">CVE-2019-19447</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19524" impact="moderate" public="20191115">CVE-2019-19524</cve>
          <cve cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-772-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-19533" impact="low" public="20190821">CVE-2019-19533</cve>
          <cve cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-362" href="https://access.redhat.com/security/cve/CVE-2019-19537" impact="moderate" public="20190812">CVE-2019-19537</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19543" impact="moderate" public="20190319">CVE-2019-19543</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cwe="CWE-672" href="https://access.redhat.com/security/cve/CVE-2019-19602" impact="moderate" public="20191126">CVE-2019-19602</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19767" impact="moderate" public="20191107">CVE-2019-19767</cve>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19770" impact="moderate" public="20191129">CVE-2019-19770</cve>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-20054" impact="low" public="20191228">CVE-2019-20054</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-20636" impact="moderate" public="20200404">CVE-2019-20636</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-20812" impact="moderate" public="20191209">CVE-2019-20812</cve>
          <cve cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-9455" impact="low" public="20190903">CVE-2019-9455</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9458" impact="moderate" public="20190903">CVE-2019-9458</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-0305" impact="moderate" public="20200717">CVE-2020-0305</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-99-&gt;CWE-244" href="https://access.redhat.com/security/cve/CVE-2020-0444" impact="important" public="20210118">CVE-2020-0444</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-10732" impact="moderate" public="20200501">CVE-2020-10732</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" cwe="CWE-349" href="https://access.redhat.com/security/cve/CVE-2020-10751" impact="moderate" public="20200427:1400">CVE-2020-10751</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-626" href="https://access.redhat.com/security/cve/CVE-2020-10773" impact="low" public="20191028:1400">CVE-2020-10773</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-909" href="https://access.redhat.com/security/cve/CVE-2020-10774" impact="low" public="20200615">CVE-2020-10774</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-20-&gt;CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-10942" impact="low" public="20200322">CVE-2020-10942</cve>
          <cve cvss3="6.0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-11565" impact="moderate" public="20200401">CVE-2020-11565</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-20-&gt;CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-11668" impact="moderate" public="20200103">CVE-2020-11668</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12465" impact="moderate" public="20200303">CVE-2020-12465</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-12655" impact="low" public="20200302">CVE-2020-12655</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-12659" impact="moderate" public="20200505">CVE-2020-12659</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-401-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12770" impact="moderate" public="20200414">CVE-2020-12770</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2020-12826" impact="moderate" public="20200512:0540">CVE-2020-12826</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-14381" impact="moderate" public="20200507:1900">CVE-2020-14381</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-25641" impact="moderate" public="20200930:0024">CVE-2020-25641</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-8647" impact="moderate" public="20200130">CVE-2020-8647</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8648" impact="moderate" public="20200130">CVE-2020-8648</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8649" impact="moderate" public="20200130">CVE-2020-8649</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2021-3715" impact="important" public="20210907:0825">CVE-2021-3715</cve>
          <bugzilla href="https://bugzilla.redhat.com/1718176" id="1718176">CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1759052" id="1759052">CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760100" id="1760100">CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760310" id="1760310">CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760420" id="1760420">CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774946" id="1774946">CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774963" id="1774963">CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774988" id="1774988">CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775015" id="1775015">CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775021" id="1775021">CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775097" id="1775097">CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777418" id="1777418">CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777449" id="1777449">CVE-2019-18809 kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779594" id="1779594">CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781679" id="1781679">CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781810" id="1781810">CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783459" id="1783459">CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783534" id="1783534">CVE-2019-19533 kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783561" id="1783561">CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1784130" id="1784130">CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1784572" id="1784572">CVE-2019-19602 kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786160" id="1786160">CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786179" id="1786179">CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790063" id="1790063">CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802555" id="1802555">CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802559" id="1802559">CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802563" id="1802563">CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1817718" id="1817718">CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1819377" id="1819377">CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1819399" id="1819399">CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1822077" id="1822077">CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824059" id="1824059">CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824792" id="1824792">CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824918" id="1824918">CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831399" id="1831399">CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831699" id="1831699">CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832543" id="1832543">CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832876" id="1832876">CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1834845" id="1834845">CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1839634" id="1839634">CVE-2020-10751 kernel: SELinux netlink permission check bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846380" id="1846380">CVE-2020-10773 kernel: kernel stack information leak on s390/s390x</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846462" id="1846462">CVE-2019-20812 kernel: af_packet: TPACKET_V3: invalid timer timeout on error</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846964" id="1846964">CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1860065" id="1860065">CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1874311" id="1874311">CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881424" id="1881424">CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920474" id="1920474">CVE-2020-0444 kernel: bad kfree in auditfilter.c may lead to escalation of privilege</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1993988" id="1993988">CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-240.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204431051"/>
            <criterion comment="kernel earlier than 0:4.18.0-240.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204431052"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-headers is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431025"/>
              <criterion comment="kernel-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431027"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431029"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431031"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431033"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431035"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431037"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431039"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431041"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431043"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431045"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431047"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-240.el8" test_ref="oval:org.almalinux.alsa:tst:20204431049"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204432" version="637">
      <metadata>
        <title>ALSA-2020:4432: python-pip security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4432" ref_url="https://errata.almalinux.org/8/ALSA-2020-4432.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4432" ref_url="https://access.redhat.com/errata/RHSA-2020:4432" source="RHSA"/>
        <reference ref_id="CVE-2019-20916" ref_url="https://access.redhat.com/security/cve/CVE-2019-20916" source="CVE"/>
        <description>pip is a package management system used to install and manage software packages written in Python. Many packages can be found in the Python Package Index (PyPI). pip is a recursive acronym that can stand for either "Pip Installs Packages" or "Pip Installs Python". 

Security Fix(es):

* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-20916" impact="moderate" public="20190416">CVE-2019-20916</cve>
          <bugzilla href="https://bugzilla.redhat.com/1868135" id="1868135">CVE-2019-20916 python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python-pip is earlier than 0:9.0.3-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204432001"/>
              <criterion comment="platform-python-pip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pip is earlier than 0:9.0.3-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204432003"/>
              <criterion comment="python3-pip is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-pip-wheel is earlier than 0:9.0.3-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204432005"/>
              <criterion comment="python3-pip-wheel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201916006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204433" version="636">
      <metadata>
        <title>ALSA-2020:4433: python3 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4433" ref_url="https://errata.almalinux.org/8/ALSA-2020-4433.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4433" ref_url="https://access.redhat.com/errata/RHSA-2020:4433" source="RHSA"/>
        <reference ref_id="CVE-2019-16935" ref_url="https://access.redhat.com/security/cve/CVE-2019-16935" source="CVE"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://access.redhat.com/security/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2020-14422" ref_url="https://access.redhat.com/security/cve/CVE-2020-14422" source="CVE"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://access.redhat.com/security/cve/CVE-2020-8492" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 

Security Fix(es):

* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)

* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)

* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)

* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-16935" impact="moderate" public="20190921">CVE-2019-16935</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-20907" impact="moderate" public="20191210">CVE-2019-20907</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-14422" impact="moderate" public="20200618">CVE-2020-14422</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8492" impact="moderate" public="20200302">CVE-2020-8492</cve>
          <bugzilla href="https://bugzilla.redhat.com/1763229" id="1763229">CVE-2019-16935 python: XSS vulnerability in the documentation XML-RPC server in server_title field</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809065" id="1809065">CVE-2020-8492 python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1854926" id="1854926">CVE-2020-14422 python: DoS via inefficiency in IPv{4,6}Interface classes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856481" id="1856481">CVE-2019-20907 python: infinite loop in the tarfile module via crafted TAR archive</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="platform-python is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433001"/>
              <criterion comment="platform-python is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-debug is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433003"/>
              <criterion comment="platform-python-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="platform-python-devel is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433005"/>
              <criterion comment="platform-python-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-idle is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433007"/>
              <criterion comment="python3-idle is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libs is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433009"/>
              <criterion comment="python3-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-test is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433011"/>
              <criterion comment="python3-test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-tkinter is earlier than 0:3.6.8-31.el8" test_ref="oval:org.almalinux.alsa:tst:20204433013"/>
              <criterion comment="python3-tkinter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190997014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204436" version="638">
      <metadata>
        <title>ALSA-2020:4436: gnome-software and fwupd security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4436" ref_url="https://errata.almalinux.org/8/ALSA-2020-4436.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4436" ref_url="https://access.redhat.com/errata/RHSA-2020:4436" source="RHSA"/>
        <reference ref_id="CVE-2020-10759" ref_url="https://access.redhat.com/security/cve/CVE-2020-10759" source="CVE"/>
        <description>The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.

The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. 

The fwupd packages provide a service that allows session software to update device firmware.

The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).

Security Fix(es):

* fwupd: Possible bypass in signature verification (CVE-2020-10759)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-347" href="https://access.redhat.com/security/cve/CVE-2020-10759" impact="low" public="20200605">CVE-2020-10759</cve>
          <bugzilla href="https://bugzilla.redhat.com/1844316" id="1844316">CVE-2020-10759 fwupd: Possible bypass in signature verification</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libxmlb is earlier than 0:0.1.15-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204436001"/>
              <criterion comment="libxmlb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204436002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-software is earlier than 0:3.36.1-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204436003"/>
              <criterion comment="gnome-software is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="appstream-data is earlier than 0:8-20200724.el8" test_ref="oval:org.almalinux.alsa:tst:20204436005"/>
              <criterion comment="appstream-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fwupd is earlier than 0:1.4.2-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204436007"/>
              <criterion comment="fwupd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20203216010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204442" version="636">
      <metadata>
        <title>ALSA-2020:4442: sqlite security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4442" ref_url="https://errata.almalinux.org/8/ALSA-2020-4442.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4442" ref_url="https://access.redhat.com/errata/RHSA-2020:4442" source="RHSA"/>
        <reference ref_id="CVE-2019-16168" ref_url="https://access.redhat.com/security/cve/CVE-2019-16168" source="CVE"/>
        <reference ref_id="CVE-2019-20218" ref_url="https://access.redhat.com/security/cve/CVE-2019-20218" source="CVE"/>
        <reference ref_id="CVE-2019-5018" ref_url="https://access.redhat.com/security/cve/CVE-2019-5018" source="CVE"/>
        <reference ref_id="CVE-2020-13630" ref_url="https://access.redhat.com/security/cve/CVE-2020-13630" source="CVE"/>
        <reference ref_id="CVE-2020-13631" ref_url="https://access.redhat.com/security/cve/CVE-2020-13631" source="CVE"/>
        <reference ref_id="CVE-2020-13632" ref_url="https://access.redhat.com/security/cve/CVE-2020-13632" source="CVE"/>
        <reference ref_id="CVE-2020-6405" ref_url="https://access.redhat.com/security/cve/CVE-2020-6405" source="CVE"/>
        <reference ref_id="CVE-2020-9327" ref_url="https://access.redhat.com/security/cve/CVE-2020-9327" source="CVE"/>
        <description>SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: Use-after-free in window function leading to remote code execution (CVE-2019-5018)

* sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c (CVE-2019-16168)

* sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (CVE-2019-20218)

* sqlite: Out-of-bounds read in SELECT with ON/USING clause (CVE-2020-6405)

* sqlite: NULL pointer dereference and segmentation fault because of generated column optimizations (CVE-2020-9327)

* sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c (CVE-2020-13630)

* sqlite: Virtual table can be renamed into the name of one of its shadow tables (CVE-2020-13631)

* sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query (CVE-2020-13632)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2019-16168" impact="moderate" public="20190815">CVE-2019-16168</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-391" href="https://access.redhat.com/security/cve/CVE-2019-20218" impact="moderate" public="20200102">CVE-2019-20218</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-5018" impact="moderate" public="20190509">CVE-2019-5018</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-13630" impact="moderate" public="20200516">CVE-2020-13630</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-13631" impact="moderate" public="20200514">CVE-2020-13631</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-13632" impact="moderate" public="20200514">CVE-2020-13632</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-6405" impact="moderate" public="20200116">CVE-2020-6405</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-9327" impact="moderate" public="20200221">CVE-2020-9327</cve>
          <bugzilla href="https://bugzilla.redhat.com/1708301" id="1708301">CVE-2019-5018 sqlite: Use-after-free in window function leading to remote code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1768986" id="1768986">CVE-2019-16168 sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1791313" id="1791313">CVE-2019-20218 sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801181" id="1801181">CVE-2020-6405 sqlite: Out-of-bounds read in SELECT with ON/USING clause</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809315" id="1809315">CVE-2020-9327 sqlite: NULL pointer dereference and segmentation fault because of generated column optimizations</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1841562" id="1841562">CVE-2020-13630 sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1841568" id="1841568">CVE-2020-13631 sqlite: Virtual table can be renamed into the name of one of its shadow tables</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1841574" id="1841574">CVE-2020-13632 sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="lemon is earlier than 0:3.26.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204442001"/>
              <criterion comment="lemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite is earlier than 0:3.26.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204442003"/>
              <criterion comment="sqlite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-devel is earlier than 0:3.26.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204442005"/>
              <criterion comment="sqlite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-doc is earlier than 0:3.26.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204442007"/>
              <criterion comment="sqlite-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="sqlite-libs is earlier than 0:3.26.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204442009"/>
              <criterion comment="sqlite-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200273010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204443" version="635">
      <metadata>
        <title>ALSA-2020:4443: libarchive security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4443" ref_url="https://errata.almalinux.org/8/ALSA-2020-4443.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4443" ref_url="https://access.redhat.com/errata/RHSA-2020:4443" source="RHSA"/>
        <reference ref_id="CVE-2019-19221" ref_url="https://access.redhat.com/security/cve/CVE-2019-19221" source="CVE"/>
        <description>The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.

Security Fix(es):

* libarchive: out-of-bounds read in archive_wstring_append_from_mbs in archive_string.c (CVE-2019-19221)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-19221" impact="moderate" public="20191121">CVE-2019-19221</cve>
          <bugzilla href="https://bugzilla.redhat.com/1801635" id="1801635">CVE-2019-19221 libarchive: out-of-bounds read in archive_wstring_append_from_mbs in archive_string.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bsdtar is earlier than 0:3.3.2-9.el8" test_ref="oval:org.almalinux.alsa:tst:20204443001"/>
              <criterion comment="bsdtar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive is earlier than 0:3.3.2-9.el8" test_ref="oval:org.almalinux.alsa:tst:20204443003"/>
              <criterion comment="libarchive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libarchive-devel is earlier than 0:3.3.2-9.el8" test_ref="oval:org.almalinux.alsa:tst:20204443005"/>
              <criterion comment="libarchive-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20211580006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204444" version="637">
      <metadata>
        <title>ALSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4444" ref_url="https://errata.almalinux.org/8/ALSA-2020-4444.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4444" ref_url="https://access.redhat.com/errata/RHSA-2020:4444" source="RHSA"/>
        <reference ref_id="CVE-2020-10029" ref_url="https://access.redhat.com/security/cve/CVE-2020-10029" source="CVE"/>
        <reference ref_id="CVE-2020-1751" ref_url="https://access.redhat.com/security/cve/CVE-2020-1751" source="CVE"/>
        <reference ref_id="CVE-2020-1752" ref_url="https://access.redhat.com/security/cve/CVE-2020-1752" source="CVE"/>
        <description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* glibc: array overflow in backtrace functions for powerpc (CVE-2020-1751)

* glibc: use-after-free in glob() function when expanding ~user (CVE-2020-1752)

* glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2020-10029" impact="moderate" public="20200212">CVE-2020-10029</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-1751" impact="moderate" public="20200120">CVE-2020-1751</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-1752" impact="moderate" public="20200117">CVE-2020-1752</cve>
          <bugzilla href="https://bugzilla.redhat.com/1810670" id="1810670">CVE-2020-10029 glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1810718" id="1810718">CVE-2020-1752 glibc: use-after-free in glob() function when expanding ~user</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1810719" id="1810719">CVE-2020-1751 glibc: array overflow in backtrace functions for powerpc</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="compat-libpthread-nonshared is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444001"/>
              <criterion comment="compat-libpthread-nonshared is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444003"/>
              <criterion comment="glibc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-all-langpacks is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444005"/>
              <criterion comment="glibc-all-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-benchtests is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444007"/>
              <criterion comment="glibc-benchtests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-common is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444009"/>
              <criterion comment="glibc-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-devel is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444011"/>
              <criterion comment="glibc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-headers is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444013"/>
              <criterion comment="glibc-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-aa is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444015"/>
              <criterion comment="glibc-langpack-aa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-af is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444017"/>
              <criterion comment="glibc-langpack-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-agr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444019"/>
              <criterion comment="glibc-langpack-agr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ak is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444021"/>
              <criterion comment="glibc-langpack-ak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-am is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444023"/>
              <criterion comment="glibc-langpack-am is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-an is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444025"/>
              <criterion comment="glibc-langpack-an is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-anp is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444027"/>
              <criterion comment="glibc-langpack-anp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ar is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444029"/>
              <criterion comment="glibc-langpack-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-as is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444031"/>
              <criterion comment="glibc-langpack-as is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ast is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444033"/>
              <criterion comment="glibc-langpack-ast is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ayc is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444035"/>
              <criterion comment="glibc-langpack-ayc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-az is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444037"/>
              <criterion comment="glibc-langpack-az is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-be is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444039"/>
              <criterion comment="glibc-langpack-be is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bem is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444041"/>
              <criterion comment="glibc-langpack-bem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ber is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444043"/>
              <criterion comment="glibc-langpack-ber is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bg is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444045"/>
              <criterion comment="glibc-langpack-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bhb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444047"/>
              <criterion comment="glibc-langpack-bhb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bho is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444049"/>
              <criterion comment="glibc-langpack-bho is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444051"/>
              <criterion comment="glibc-langpack-bi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444053"/>
              <criterion comment="glibc-langpack-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444055"/>
              <criterion comment="glibc-langpack-bo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-br is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444057"/>
              <criterion comment="glibc-langpack-br is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-brx is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444059"/>
              <criterion comment="glibc-langpack-brx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-bs is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444061"/>
              <criterion comment="glibc-langpack-bs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-byn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444063"/>
              <criterion comment="glibc-langpack-byn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ca is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444065"/>
              <criterion comment="glibc-langpack-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ce is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444067"/>
              <criterion comment="glibc-langpack-ce is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-chr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444069"/>
              <criterion comment="glibc-langpack-chr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cmn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444071"/>
              <criterion comment="glibc-langpack-cmn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-crh is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444073"/>
              <criterion comment="glibc-langpack-crh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cs is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444075"/>
              <criterion comment="glibc-langpack-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-csb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444077"/>
              <criterion comment="glibc-langpack-csb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cv is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444079"/>
              <criterion comment="glibc-langpack-cv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-cy is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444081"/>
              <criterion comment="glibc-langpack-cy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-da is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444083"/>
              <criterion comment="glibc-langpack-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-de is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444085"/>
              <criterion comment="glibc-langpack-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-doi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444087"/>
              <criterion comment="glibc-langpack-doi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dsb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444089"/>
              <criterion comment="glibc-langpack-dsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dv is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444091"/>
              <criterion comment="glibc-langpack-dv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-dz is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444093"/>
              <criterion comment="glibc-langpack-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-el is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444095"/>
              <criterion comment="glibc-langpack-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-en is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444097"/>
              <criterion comment="glibc-langpack-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444099"/>
              <criterion comment="glibc-langpack-eo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-es is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444101"/>
              <criterion comment="glibc-langpack-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-et is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444103"/>
              <criterion comment="glibc-langpack-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-eu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444105"/>
              <criterion comment="glibc-langpack-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fa is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444107"/>
              <criterion comment="glibc-langpack-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ff is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444109"/>
              <criterion comment="glibc-langpack-ff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444111"/>
              <criterion comment="glibc-langpack-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fil is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444113"/>
              <criterion comment="glibc-langpack-fil is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444115"/>
              <criterion comment="glibc-langpack-fo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444117"/>
              <criterion comment="glibc-langpack-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fur is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444119"/>
              <criterion comment="glibc-langpack-fur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-fy is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444121"/>
              <criterion comment="glibc-langpack-fy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ga is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444123"/>
              <criterion comment="glibc-langpack-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gd is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444125"/>
              <criterion comment="glibc-langpack-gd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gez is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444127"/>
              <criterion comment="glibc-langpack-gez is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444129"/>
              <criterion comment="glibc-langpack-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444131"/>
              <criterion comment="glibc-langpack-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-gv is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444133"/>
              <criterion comment="glibc-langpack-gv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ha is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444135"/>
              <criterion comment="glibc-langpack-ha is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hak is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444137"/>
              <criterion comment="glibc-langpack-hak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-he is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444139"/>
              <criterion comment="glibc-langpack-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444141"/>
              <criterion comment="glibc-langpack-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hif is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444143"/>
              <criterion comment="glibc-langpack-hif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hne is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444145"/>
              <criterion comment="glibc-langpack-hne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444147"/>
              <criterion comment="glibc-langpack-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hsb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444149"/>
              <criterion comment="glibc-langpack-hsb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ht is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444151"/>
              <criterion comment="glibc-langpack-ht is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444153"/>
              <criterion comment="glibc-langpack-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-hy is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444155"/>
              <criterion comment="glibc-langpack-hy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ia is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444157"/>
              <criterion comment="glibc-langpack-ia is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-id is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444159"/>
              <criterion comment="glibc-langpack-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ig is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444161"/>
              <criterion comment="glibc-langpack-ig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ik is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444163"/>
              <criterion comment="glibc-langpack-ik is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-is is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444165"/>
              <criterion comment="glibc-langpack-is is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-it is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444167"/>
              <criterion comment="glibc-langpack-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-iu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444169"/>
              <criterion comment="glibc-langpack-iu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ja is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444171"/>
              <criterion comment="glibc-langpack-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ka is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444173"/>
              <criterion comment="glibc-langpack-ka is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kab is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444175"/>
              <criterion comment="glibc-langpack-kab is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kk is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444177"/>
              <criterion comment="glibc-langpack-kk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444179"/>
              <criterion comment="glibc-langpack-kl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-km is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444181"/>
              <criterion comment="glibc-langpack-km is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444183"/>
              <criterion comment="glibc-langpack-kn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ko is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444185"/>
              <criterion comment="glibc-langpack-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kok is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444187"/>
              <criterion comment="glibc-langpack-kok is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ks is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444189"/>
              <criterion comment="glibc-langpack-ks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ku is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444191"/>
              <criterion comment="glibc-langpack-ku is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-kw is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444193"/>
              <criterion comment="glibc-langpack-kw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ky is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444195"/>
              <criterion comment="glibc-langpack-ky is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444197"/>
              <criterion comment="glibc-langpack-lb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lg is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444199"/>
              <criterion comment="glibc-langpack-lg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-li is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444201"/>
              <criterion comment="glibc-langpack-li is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lij is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444203"/>
              <criterion comment="glibc-langpack-lij is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ln is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444205"/>
              <criterion comment="glibc-langpack-ln is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444207"/>
              <criterion comment="glibc-langpack-lo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lt is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444209"/>
              <criterion comment="glibc-langpack-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lv is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444211"/>
              <criterion comment="glibc-langpack-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-lzh is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444213"/>
              <criterion comment="glibc-langpack-lzh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513214"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mag is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444215"/>
              <criterion comment="glibc-langpack-mag is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513216"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mai is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444217"/>
              <criterion comment="glibc-langpack-mai is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513218"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mfe is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444219"/>
              <criterion comment="glibc-langpack-mfe is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513220"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mg is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444221"/>
              <criterion comment="glibc-langpack-mg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mhr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444223"/>
              <criterion comment="glibc-langpack-mhr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513224"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444225"/>
              <criterion comment="glibc-langpack-mi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513226"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-miq is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444227"/>
              <criterion comment="glibc-langpack-miq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513228"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mjw is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444229"/>
              <criterion comment="glibc-langpack-mjw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513230"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mk is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444231"/>
              <criterion comment="glibc-langpack-mk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513232"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ml is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444233"/>
              <criterion comment="glibc-langpack-ml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513234"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444235"/>
              <criterion comment="glibc-langpack-mn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513236"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mni is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444237"/>
              <criterion comment="glibc-langpack-mni is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513238"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444239"/>
              <criterion comment="glibc-langpack-mr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513240"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ms is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444241"/>
              <criterion comment="glibc-langpack-ms is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-mt is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444243"/>
              <criterion comment="glibc-langpack-mt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513244"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-my is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444245"/>
              <criterion comment="glibc-langpack-my is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513246"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nan is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444247"/>
              <criterion comment="glibc-langpack-nan is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513248"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nb is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444249"/>
              <criterion comment="glibc-langpack-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513250"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nds is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444251"/>
              <criterion comment="glibc-langpack-nds is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513252"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ne is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444253"/>
              <criterion comment="glibc-langpack-ne is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513254"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nhn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444255"/>
              <criterion comment="glibc-langpack-nhn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513256"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-niu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444257"/>
              <criterion comment="glibc-langpack-niu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513258"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444259"/>
              <criterion comment="glibc-langpack-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513260"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444261"/>
              <criterion comment="glibc-langpack-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444263"/>
              <criterion comment="glibc-langpack-nr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513264"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-nso is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444265"/>
              <criterion comment="glibc-langpack-nso is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513266"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-oc is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444267"/>
              <criterion comment="glibc-langpack-oc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513268"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-om is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444269"/>
              <criterion comment="glibc-langpack-om is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513270"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-or is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444271"/>
              <criterion comment="glibc-langpack-or is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513272"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-os is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444273"/>
              <criterion comment="glibc-langpack-os is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513274"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pa is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444275"/>
              <criterion comment="glibc-langpack-pa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513276"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pap is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444277"/>
              <criterion comment="glibc-langpack-pap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513278"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444279"/>
              <criterion comment="glibc-langpack-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513280"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ps is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444281"/>
              <criterion comment="glibc-langpack-ps is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-pt is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444283"/>
              <criterion comment="glibc-langpack-pt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513284"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-quz is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444285"/>
              <criterion comment="glibc-langpack-quz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513286"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-raj is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444287"/>
              <criterion comment="glibc-langpack-raj is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513288"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ro is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444289"/>
              <criterion comment="glibc-langpack-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513290"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ru is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444291"/>
              <criterion comment="glibc-langpack-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513292"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-rw is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444293"/>
              <criterion comment="glibc-langpack-rw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513294"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sa is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444295"/>
              <criterion comment="glibc-langpack-sa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513296"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sah is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444297"/>
              <criterion comment="glibc-langpack-sah is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513298"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sat is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444299"/>
              <criterion comment="glibc-langpack-sat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513300"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sc is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444301"/>
              <criterion comment="glibc-langpack-sc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sd is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444303"/>
              <criterion comment="glibc-langpack-sd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513304"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-se is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444305"/>
              <criterion comment="glibc-langpack-se is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513306"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sgs is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444307"/>
              <criterion comment="glibc-langpack-sgs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513308"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444309"/>
              <criterion comment="glibc-langpack-shn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513310"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-shs is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444311"/>
              <criterion comment="glibc-langpack-shs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513312"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-si is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444313"/>
              <criterion comment="glibc-langpack-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513314"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sid is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444315"/>
              <criterion comment="glibc-langpack-sid is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513316"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sk is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444317"/>
              <criterion comment="glibc-langpack-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513318"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444319"/>
              <criterion comment="glibc-langpack-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513320"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sm is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444321"/>
              <criterion comment="glibc-langpack-sm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-so is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444323"/>
              <criterion comment="glibc-langpack-so is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513324"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sq is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444325"/>
              <criterion comment="glibc-langpack-sq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513326"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444327"/>
              <criterion comment="glibc-langpack-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513328"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ss is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444329"/>
              <criterion comment="glibc-langpack-ss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513330"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-st is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444331"/>
              <criterion comment="glibc-langpack-st is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513332"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sv is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444333"/>
              <criterion comment="glibc-langpack-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513334"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-sw is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444335"/>
              <criterion comment="glibc-langpack-sw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513336"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-szl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444337"/>
              <criterion comment="glibc-langpack-szl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513338"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ta is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444339"/>
              <criterion comment="glibc-langpack-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513340"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tcy is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444341"/>
              <criterion comment="glibc-langpack-tcy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-te is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444343"/>
              <criterion comment="glibc-langpack-te is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513344"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tg is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444345"/>
              <criterion comment="glibc-langpack-tg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513346"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-th is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444347"/>
              <criterion comment="glibc-langpack-th is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513348"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-the is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444349"/>
              <criterion comment="glibc-langpack-the is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513350"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ti is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444351"/>
              <criterion comment="glibc-langpack-ti is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513352"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tig is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444353"/>
              <criterion comment="glibc-langpack-tig is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513354"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tk is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444355"/>
              <criterion comment="glibc-langpack-tk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513356"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444357"/>
              <criterion comment="glibc-langpack-tl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513358"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tn is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444359"/>
              <criterion comment="glibc-langpack-tn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513360"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-to is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444361"/>
              <criterion comment="glibc-langpack-to is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tpi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444363"/>
              <criterion comment="glibc-langpack-tpi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513364"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tr is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444365"/>
              <criterion comment="glibc-langpack-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513366"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ts is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444367"/>
              <criterion comment="glibc-langpack-ts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513368"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-tt is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444369"/>
              <criterion comment="glibc-langpack-tt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513370"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ug is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444371"/>
              <criterion comment="glibc-langpack-ug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513372"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uk is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444373"/>
              <criterion comment="glibc-langpack-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513374"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-unm is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444375"/>
              <criterion comment="glibc-langpack-unm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513376"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ur is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444377"/>
              <criterion comment="glibc-langpack-ur is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513378"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-uz is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444379"/>
              <criterion comment="glibc-langpack-uz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513380"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-ve is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444381"/>
              <criterion comment="glibc-langpack-ve is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513382"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-vi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444383"/>
              <criterion comment="glibc-langpack-vi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513384"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wa is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444385"/>
              <criterion comment="glibc-langpack-wa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513386"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wae is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444387"/>
              <criterion comment="glibc-langpack-wae is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513388"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wal is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444389"/>
              <criterion comment="glibc-langpack-wal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513390"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-wo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444391"/>
              <criterion comment="glibc-langpack-wo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513392"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-xh is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444393"/>
              <criterion comment="glibc-langpack-xh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513394"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yi is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444395"/>
              <criterion comment="glibc-langpack-yi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513396"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yo is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444397"/>
              <criterion comment="glibc-langpack-yo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513398"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yue is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444399"/>
              <criterion comment="glibc-langpack-yue is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513400"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-yuw is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444401"/>
              <criterion comment="glibc-langpack-yuw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zh is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444403"/>
              <criterion comment="glibc-langpack-zh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513404"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-langpack-zu is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444405"/>
              <criterion comment="glibc-langpack-zu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513406"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-locale-source is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444407"/>
              <criterion comment="glibc-locale-source is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513408"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-minimal-langpack is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444409"/>
              <criterion comment="glibc-minimal-langpack is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513410"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-nss-devel is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444411"/>
              <criterion comment="glibc-nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513412"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-static is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444413"/>
              <criterion comment="glibc-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513414"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="glibc-utils is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444415"/>
              <criterion comment="glibc-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513416"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libnsl is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444417"/>
              <criterion comment="libnsl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513418"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nscd is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444419"/>
              <criterion comment="nscd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513420"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_db is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444421"/>
              <criterion comment="nss_db is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513422"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss_hesiod is earlier than 0:2.28-127.el8" test_ref="oval:org.almalinux.alsa:tst:20204444423"/>
              <criterion comment="nss_hesiod is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193513424"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204445" version="636">
      <metadata>
        <title>ALSA-2020:4445: librabbitmq security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4445" ref_url="https://errata.almalinux.org/8/ALSA-2020-4445.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4445" ref_url="https://access.redhat.com/errata/RHSA-2020:4445" source="RHSA"/>
        <reference ref_id="CVE-2019-18609" ref_url="https://access.redhat.com/security/cve/CVE-2019-18609" source="CVE"/>
        <description>The librabbitmq packages provide an Advanced Message Queuing Protocol (AMQP) client library that allows you to communicate with AMQP servers using protocol version 0-9-1.

Security Fix(es):

* librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-18609" impact="moderate" public="20191201">CVE-2019-18609</cve>
          <bugzilla href="https://bugzilla.redhat.com/1786646" id="1786646">CVE-2019-18609 librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="librabbitmq is earlier than 0:0.9.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204445001"/>
              <criterion comment="librabbitmq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204445002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="librabbitmq-devel is earlier than 0:0.9.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204445003"/>
              <criterion comment="librabbitmq-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204445004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204451" version="640">
      <metadata>
        <title>ALSA-2020:4451: GNOME security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4451" ref_url="https://errata.almalinux.org/8/ALSA-2020-4451.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4451" ref_url="https://access.redhat.com/errata/RHSA-2020:4451" source="RHSA"/>
        <reference ref_id="CVE-2019-8625" ref_url="https://access.redhat.com/security/cve/CVE-2019-8625" source="CVE"/>
        <reference ref_id="CVE-2019-8710" ref_url="https://access.redhat.com/security/cve/CVE-2019-8710" source="CVE"/>
        <reference ref_id="CVE-2019-8720" ref_url="https://access.redhat.com/security/cve/CVE-2019-8720" source="CVE"/>
        <reference ref_id="CVE-2019-8743" ref_url="https://access.redhat.com/security/cve/CVE-2019-8743" source="CVE"/>
        <reference ref_id="CVE-2019-8764" ref_url="https://access.redhat.com/security/cve/CVE-2019-8764" source="CVE"/>
        <reference ref_id="CVE-2019-8766" ref_url="https://access.redhat.com/security/cve/CVE-2019-8766" source="CVE"/>
        <reference ref_id="CVE-2019-8769" ref_url="https://access.redhat.com/security/cve/CVE-2019-8769" source="CVE"/>
        <reference ref_id="CVE-2019-8771" ref_url="https://access.redhat.com/security/cve/CVE-2019-8771" source="CVE"/>
        <reference ref_id="CVE-2019-8782" ref_url="https://access.redhat.com/security/cve/CVE-2019-8782" source="CVE"/>
        <reference ref_id="CVE-2019-8783" ref_url="https://access.redhat.com/security/cve/CVE-2019-8783" source="CVE"/>
        <reference ref_id="CVE-2019-8808" ref_url="https://access.redhat.com/security/cve/CVE-2019-8808" source="CVE"/>
        <reference ref_id="CVE-2019-8811" ref_url="https://access.redhat.com/security/cve/CVE-2019-8811" source="CVE"/>
        <reference ref_id="CVE-2019-8812" ref_url="https://access.redhat.com/security/cve/CVE-2019-8812" source="CVE"/>
        <reference ref_id="CVE-2019-8813" ref_url="https://access.redhat.com/security/cve/CVE-2019-8813" source="CVE"/>
        <reference ref_id="CVE-2019-8814" ref_url="https://access.redhat.com/security/cve/CVE-2019-8814" source="CVE"/>
        <reference ref_id="CVE-2019-8815" ref_url="https://access.redhat.com/security/cve/CVE-2019-8815" source="CVE"/>
        <reference ref_id="CVE-2019-8816" ref_url="https://access.redhat.com/security/cve/CVE-2019-8816" source="CVE"/>
        <reference ref_id="CVE-2019-8819" ref_url="https://access.redhat.com/security/cve/CVE-2019-8819" source="CVE"/>
        <reference ref_id="CVE-2019-8820" ref_url="https://access.redhat.com/security/cve/CVE-2019-8820" source="CVE"/>
        <reference ref_id="CVE-2019-8823" ref_url="https://access.redhat.com/security/cve/CVE-2019-8823" source="CVE"/>
        <reference ref_id="CVE-2019-8835" ref_url="https://access.redhat.com/security/cve/CVE-2019-8835" source="CVE"/>
        <reference ref_id="CVE-2019-8844" ref_url="https://access.redhat.com/security/cve/CVE-2019-8844" source="CVE"/>
        <reference ref_id="CVE-2019-8846" ref_url="https://access.redhat.com/security/cve/CVE-2019-8846" source="CVE"/>
        <reference ref_id="CVE-2020-10018" ref_url="https://access.redhat.com/security/cve/CVE-2020-10018" source="CVE"/>
        <reference ref_id="CVE-2020-11793" ref_url="https://access.redhat.com/security/cve/CVE-2020-11793" source="CVE"/>
        <reference ref_id="CVE-2020-14391" ref_url="https://access.redhat.com/security/cve/CVE-2020-14391" source="CVE"/>
        <reference ref_id="CVE-2020-15503" ref_url="https://access.redhat.com/security/cve/CVE-2020-15503" source="CVE"/>
        <reference ref_id="CVE-2020-3862" ref_url="https://access.redhat.com/security/cve/CVE-2020-3862" source="CVE"/>
        <reference ref_id="CVE-2020-3864" ref_url="https://access.redhat.com/security/cve/CVE-2020-3864" source="CVE"/>
        <reference ref_id="CVE-2020-3865" ref_url="https://access.redhat.com/security/cve/CVE-2020-3865" source="CVE"/>
        <reference ref_id="CVE-2020-3867" ref_url="https://access.redhat.com/security/cve/CVE-2020-3867" source="CVE"/>
        <reference ref_id="CVE-2020-3868" ref_url="https://access.redhat.com/security/cve/CVE-2020-3868" source="CVE"/>
        <reference ref_id="CVE-2020-3885" ref_url="https://access.redhat.com/security/cve/CVE-2020-3885" source="CVE"/>
        <reference ref_id="CVE-2020-3894" ref_url="https://access.redhat.com/security/cve/CVE-2020-3894" source="CVE"/>
        <reference ref_id="CVE-2020-3895" ref_url="https://access.redhat.com/security/cve/CVE-2020-3895" source="CVE"/>
        <reference ref_id="CVE-2020-3897" ref_url="https://access.redhat.com/security/cve/CVE-2020-3897" source="CVE"/>
        <reference ref_id="CVE-2020-3899" ref_url="https://access.redhat.com/security/cve/CVE-2020-3899" source="CVE"/>
        <reference ref_id="CVE-2020-3900" ref_url="https://access.redhat.com/security/cve/CVE-2020-3900" source="CVE"/>
        <reference ref_id="CVE-2020-3901" ref_url="https://access.redhat.com/security/cve/CVE-2020-3901" source="CVE"/>
        <reference ref_id="CVE-2020-3902" ref_url="https://access.redhat.com/security/cve/CVE-2020-3902" source="CVE"/>
        <reference ref_id="CVE-2020-9802" ref_url="https://access.redhat.com/security/cve/CVE-2020-9802" source="CVE"/>
        <reference ref_id="CVE-2020-9803" ref_url="https://access.redhat.com/security/cve/CVE-2020-9803" source="CVE"/>
        <reference ref_id="CVE-2020-9805" ref_url="https://access.redhat.com/security/cve/CVE-2020-9805" source="CVE"/>
        <reference ref_id="CVE-2020-9806" ref_url="https://access.redhat.com/security/cve/CVE-2020-9806" source="CVE"/>
        <reference ref_id="CVE-2020-9807" ref_url="https://access.redhat.com/security/cve/CVE-2020-9807" source="CVE"/>
        <reference ref_id="CVE-2020-9843" ref_url="https://access.redhat.com/security/cve/CVE-2020-9843" source="CVE"/>
        <reference ref_id="CVE-2020-9850" ref_url="https://access.redhat.com/security/cve/CVE-2020-9850" source="CVE"/>
        <reference ref_id="CVE-2020-9862" ref_url="https://access.redhat.com/security/cve/CVE-2020-9862" source="CVE"/>
        <reference ref_id="CVE-2020-9893" ref_url="https://access.redhat.com/security/cve/CVE-2020-9893" source="CVE"/>
        <reference ref_id="CVE-2020-9894" ref_url="https://access.redhat.com/security/cve/CVE-2020-9894" source="CVE"/>
        <reference ref_id="CVE-2020-9895" ref_url="https://access.redhat.com/security/cve/CVE-2020-9895" source="CVE"/>
        <reference ref_id="CVE-2020-9915" ref_url="https://access.redhat.com/security/cve/CVE-2020-9915" source="CVE"/>
        <reference ref_id="CVE-2020-9925" ref_url="https://access.redhat.com/security/cve/CVE-2020-9925" source="CVE"/>
        <reference ref_id="CVE-2020-9952" ref_url="https://access.redhat.com/security/cve/CVE-2020-9952" source="CVE"/>
        <reference ref_id="CVE-2021-30666" ref_url="https://access.redhat.com/security/cve/CVE-2021-30666" source="CVE"/>
        <reference ref_id="CVE-2021-30761" ref_url="https://access.redhat.com/security/cve/CVE-2021-30761" source="CVE"/>
        <reference ref_id="CVE-2021-30762" ref_url="https://access.redhat.com/security/cve/CVE-2021-30762" source="CVE"/>
        <description>GNOME is the default desktop environment of AlmaLinux.

The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)

Security Fix(es):

* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)

* gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)

* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8625" impact="moderate" public="20191029">CVE-2019-8625</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8710" impact="moderate" public="20191108">CVE-2019-8710</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8720" impact="moderate" public="20191029">CVE-2019-8720</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8743" impact="moderate" public="20191108">CVE-2019-8743</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8764" impact="moderate" public="20191108">CVE-2019-8764</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8766" impact="moderate" public="20191108">CVE-2019-8766</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8769" impact="moderate" public="20191029">CVE-2019-8769</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8771" impact="moderate" public="20191029">CVE-2019-8771</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8782" impact="moderate" public="20191108">CVE-2019-8782</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8783" impact="moderate" public="20191108">CVE-2019-8783</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8808" impact="moderate" public="20191108">CVE-2019-8808</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8811" impact="moderate" public="20191108">CVE-2019-8811</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8812" impact="moderate" public="20191108">CVE-2019-8812</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-8813" impact="moderate" public="20191108">CVE-2019-8813</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8814" impact="moderate" public="20191108">CVE-2019-8814</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8815" impact="moderate" public="20191108">CVE-2019-8815</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8816" impact="moderate" public="20191108">CVE-2019-8816</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8819" impact="moderate" public="20191108">CVE-2019-8819</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8820" impact="moderate" public="20191108">CVE-2019-8820</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2019-8823" impact="moderate" public="20191108">CVE-2019-8823</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-8835" impact="moderate" public="20200123">CVE-2019-8835</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-8844" impact="moderate" public="20200123">CVE-2019-8844</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-8846" impact="moderate" public="20200123">CVE-2019-8846</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-10018" impact="moderate" public="20200302">CVE-2020-10018</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-11793" impact="moderate" public="20200416">CVE-2020-11793</cve>
          <cve cvss3="5.0/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-522" href="https://access.redhat.com/security/cve/CVE-2020-14391" impact="moderate" public="20200908">CVE-2020-14391</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15503" impact="low" public="20200622">CVE-2020-15503</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3862" impact="low" public="20200214">CVE-2020-3862</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3864" impact="moderate" public="20200214">CVE-2020-3864</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3865" impact="moderate" public="20200214">CVE-2020-3865</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-3867" impact="moderate" public="20200214">CVE-2020-3867</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3868" impact="moderate" public="20200214">CVE-2020-3868</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-3885" impact="low" public="20200427">CVE-2020-3885</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-3894" impact="low" public="20200427">CVE-2020-3894</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3895" impact="moderate" public="20200427">CVE-2020-3895</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3897" impact="moderate" public="20200427">CVE-2020-3897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3899" impact="moderate" public="20200427">CVE-2020-3899</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3900" impact="moderate" public="20200427">CVE-2020-3900</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-3901" impact="moderate" public="20200427">CVE-2020-3901</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2020-3902" impact="moderate" public="20200427">CVE-2020-3902</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-841" href="https://access.redhat.com/security/cve/CVE-2020-9802" impact="moderate" public="20200710">CVE-2020-9802</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-9803" impact="moderate" public="20200710">CVE-2020-9803</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-841-&gt;CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-9805" impact="moderate" public="20200710">CVE-2020-9805</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-9806" impact="moderate" public="20200710">CVE-2020-9806</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-9807" impact="moderate" public="20200710">CVE-2020-9807</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-20-&gt;CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-9843" impact="moderate" public="20200710">CVE-2020-9843</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-841" href="https://access.redhat.com/security/cve/CVE-2020-9850" impact="moderate" public="20200710">CVE-2020-9850</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://access.redhat.com/security/cve/CVE-2020-9862" impact="moderate" public="20200729">CVE-2020-9862</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-9893" impact="moderate" public="20200729">CVE-2020-9893</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-9894" impact="moderate" public="20200729">CVE-2020-9894</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-9895" impact="moderate" public="20200729">CVE-2020-9895</cve>
          <cve cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-9915" impact="moderate" public="20200729">CVE-2020-9915</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-841-&gt;CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-9925" impact="moderate" public="20200729">CVE-2020-9925</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cwe="CWE-20-&gt;CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-9952" impact="moderate" public="20201123">CVE-2020-9952</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-30666" impact="moderate" public="20210728">CVE-2021-30666</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-30761" impact="moderate" public="20210728">CVE-2021-30761</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-30762" impact="moderate" public="20210728">CVE-2021-30762</cve>
          <bugzilla href="https://bugzilla.redhat.com/1811721" id="1811721">CVE-2020-10018 webkitgtk: Use-after-free issue in accessibility/AXObjectCache.cpp</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816678" id="1816678">CVE-2019-8846 webkitgtk: Use after free issue may lead to remote code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816684" id="1816684">CVE-2019-8835 webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816686" id="1816686">CVE-2019-8844 webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1829369" id="1829369">CVE-2020-11793 webkitgtk: use-after-free via crafted web content</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853477" id="1853477">CVE-2020-15503 LibRaw: lack of thumbnail size range check can lead to buffer overflow</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1873093" id="1873093">CVE-2020-14391 gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876462" id="1876462">CVE-2020-3885 webkitgtk: Incorrect processing of file URLs</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876463" id="1876463">CVE-2020-3894 webkitgtk: Race condition allows reading of restricted memory</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876465" id="1876465">CVE-2020-3895 webkitgtk: Memory corruption triggered by a malicious web content</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876468" id="1876468">CVE-2020-3897 webkitgtk: Type confusion leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876470" id="1876470">CVE-2020-3899 webkitgtk: Memory consumption issue leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876472" id="1876472">CVE-2020-3900 webkitgtk: Memory corruption  triggered by a malicious web content</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876473" id="1876473">CVE-2020-3901 webkitgtk: Type confusion leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876476" id="1876476">CVE-2020-3902 webkitgtk: Input validation issue leading to cross-site script attack</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876516" id="1876516">CVE-2020-3862 webkitgtk: Denial of service via incorrect memory handling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876518" id="1876518">CVE-2020-3864 webkitgtk: Non-unique security origin for DOM object contexts</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876521" id="1876521">CVE-2020-3865 webkitgtk: Incorrect security check for a top-level DOM object context</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876522" id="1876522">CVE-2020-3867 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876523" id="1876523">CVE-2020-3868 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876536" id="1876536">CVE-2019-8710 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876537" id="1876537">CVE-2019-8743 webkitgtk: Multiple memory corruption  issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876540" id="1876540">CVE-2019-8764 webkitgtk: Incorrect state  management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876543" id="1876543">CVE-2019-8766 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876545" id="1876545">CVE-2019-8782 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876548" id="1876548">CVE-2019-8783 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876549" id="1876549">CVE-2019-8808 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876550" id="1876550">CVE-2019-8811 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876552" id="1876552">CVE-2019-8812 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876553" id="1876553">CVE-2019-8813 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876554" id="1876554">CVE-2019-8814 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876555" id="1876555">CVE-2019-8815 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876556" id="1876556">CVE-2019-8816 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876590" id="1876590">CVE-2019-8819 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876591" id="1876591">CVE-2019-8820 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876594" id="1876594">CVE-2019-8823 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876607" id="1876607">CVE-2019-8625 webkitgtk: Incorrect state management leading to universal cross-site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876611" id="1876611">CVE-2019-8720 webkitgtk: Multiple memory corruption issues leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876617" id="1876617">CVE-2019-8769 webkitgtk: Websites could reveal browsing history</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1876619" id="1876619">CVE-2019-8771 webkitgtk: Violation of iframe sandboxing policy</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879532" id="1879532">CVE-2020-9862 webkitgtk: Command injection in web inspector</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879535" id="1879535">CVE-2020-9893 webkitgtk: Use-after-free may lead to application termination or arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879536" id="1879536">CVE-2020-9894 webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879538" id="1879538">CVE-2020-9895 webkitgtk: Use-after-free may lead to application termination or arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879540" id="1879540">CVE-2020-9915 webkitgtk: Access issue in content security policy</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879541" id="1879541">CVE-2020-9925 webkitgtk: A logic issue may lead to cross site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879545" id="1879545">CVE-2020-9802 webkitgtk: Logic issue may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879557" id="1879557">CVE-2020-9803 webkitgtk: Memory corruption may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879559" id="1879559">CVE-2020-9805 webkitgtk: Logic issue may lead to cross site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879563" id="1879563">CVE-2020-9806 webkitgtk: Memory corruption may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879564" id="1879564">CVE-2020-9807 webkitgtk: Memory corruption may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879566" id="1879566">CVE-2020-9843 webkitgtk: Input validation issue may lead to cross site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879568" id="1879568">CVE-2020-9850 webkitgtk: Logic issue may lead to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1901219" id="1901219">CVE-2020-9952 webkitgtk: input validation issue may lead to a cross site scripting</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1986877" id="1986877">CVE-2021-30666 webkitgtk: Buffer overflow leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1986894" id="1986894">CVE-2021-30761 webkitgtk: Memory corruption leading to arbitrary code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1986898" id="1986898">CVE-2021-30762 webkitgtk: Use-after-free leading to arbitrary code execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnome-classic-session is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451001"/>
              <criterion comment="gnome-classic-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-apps-menu is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451003"/>
              <criterion comment="gnome-shell-extension-apps-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-auto-move-windows is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451005"/>
              <criterion comment="gnome-shell-extension-auto-move-windows is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-common is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451007"/>
              <criterion comment="gnome-shell-extension-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-dash-to-dock is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451009"/>
              <criterion comment="gnome-shell-extension-dash-to-dock is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-desktop-icons is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451011"/>
              <criterion comment="gnome-shell-extension-desktop-icons is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-disable-screenshield is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451013"/>
              <criterion comment="gnome-shell-extension-disable-screenshield is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-drive-menu is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451015"/>
              <criterion comment="gnome-shell-extension-drive-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-horizontal-workspaces is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451017"/>
              <criterion comment="gnome-shell-extension-horizontal-workspaces is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-launch-new-instance is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451019"/>
              <criterion comment="gnome-shell-extension-launch-new-instance is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-native-window-placement is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451021"/>
              <criterion comment="gnome-shell-extension-native-window-placement is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-no-hot-corner is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451023"/>
              <criterion comment="gnome-shell-extension-no-hot-corner is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-panel-favorites is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451025"/>
              <criterion comment="gnome-shell-extension-panel-favorites is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-places-menu is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451027"/>
              <criterion comment="gnome-shell-extension-places-menu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-screenshot-window-sizer is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451029"/>
              <criterion comment="gnome-shell-extension-screenshot-window-sizer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-systemMonitor is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451031"/>
              <criterion comment="gnome-shell-extension-systemMonitor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-top-icons is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451033"/>
              <criterion comment="gnome-shell-extension-top-icons is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-updates-dialog is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451035"/>
              <criterion comment="gnome-shell-extension-updates-dialog is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-user-theme is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451037"/>
              <criterion comment="gnome-shell-extension-user-theme is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-window-grouper is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451039"/>
              <criterion comment="gnome-shell-extension-window-grouper is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-window-list is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451041"/>
              <criterion comment="gnome-shell-extension-window-list is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-windowsNavigator is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451043"/>
              <criterion comment="gnome-shell-extension-windowsNavigator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell-extension-workspace-indicator is earlier than 0:3.32.1-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451045"/>
              <criterion comment="gnome-shell-extension-workspace-indicator is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451047"/>
              <criterion comment="PackageKit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-command-not-found is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451049"/>
              <criterion comment="PackageKit-command-not-found is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-cron is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451051"/>
              <criterion comment="PackageKit-cron is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-glib is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451053"/>
              <criterion comment="PackageKit-glib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-glib-devel is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451055"/>
              <criterion comment="PackageKit-glib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-gstreamer-plugin is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451057"/>
              <criterion comment="PackageKit-gstreamer-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="PackageKit-gtk3-module is earlier than 0:1.1.12-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451059"/>
              <criterion comment="PackageKit-gtk3-module is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vte-profile is earlier than 0:0.52.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451061"/>
              <criterion comment="vte-profile is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vte291 is earlier than 0:0.52.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451063"/>
              <criterion comment="vte291 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vte291-devel is earlier than 0:0.52.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451065"/>
              <criterion comment="vte291-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webrtc-audio-processing is earlier than 0:0.3-9.el8" test_ref="oval:org.almalinux.alsa:tst:20204451067"/>
              <criterion comment="webrtc-audio-processing is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk-update-icon-cache is earlier than 0:3.22.30-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451069"/>
              <criterion comment="gtk-update-icon-cache is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3 is earlier than 0:3.22.30-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451071"/>
              <criterion comment="gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-devel is earlier than 0:3.22.30-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451073"/>
              <criterion comment="gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk3-immodule-xim is earlier than 0:3.22.30-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451075"/>
              <criterion comment="gtk3-immodule-xim is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pygobject3-devel is earlier than 0:3.28.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451077"/>
              <criterion comment="pygobject3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-gobject is earlier than 0:3.28.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451079"/>
              <criterion comment="python3-gobject is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-gobject-base is earlier than 0:3.28.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451081"/>
              <criterion comment="python3-gobject-base is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-photos is earlier than 0:3.28.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204451083"/>
              <criterion comment="gnome-photos is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-photos-tests is earlier than 0:3.28.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204451085"/>
              <criterion comment="gnome-photos-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire0.2-devel is earlier than 0:0.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451087"/>
              <criterion comment="pipewire0.2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire0.2-libs is earlier than 0:0.2.7-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204451089"/>
              <criterion comment="pipewire0.2-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus is earlier than 0:3.28.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204451091"/>
              <criterion comment="nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-devel is earlier than 0:3.28.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204451093"/>
              <criterion comment="nautilus-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nautilus-extensions is earlier than 0:3.28.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204451095"/>
              <criterion comment="nautilus-extensions is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xdg-desktop-portal-gtk is earlier than 0:1.6.0-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451097"/>
              <criterion comment="xdg-desktop-portal-gtk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-terminal is earlier than 0:3.28.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451099"/>
              <criterion comment="gnome-terminal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-terminal-nautilus is earlier than 0:3.28.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451101"/>
              <criterion comment="gnome-terminal-nautilus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tracker is earlier than 0:2.1.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451103"/>
              <criterion comment="tracker is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="tracker-devel is earlier than 0:2.1.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451105"/>
              <criterion comment="tracker-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire is earlier than 0:0.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451107"/>
              <criterion comment="pipewire is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire-devel is earlier than 0:0.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451109"/>
              <criterion comment="pipewire-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire-doc is earlier than 0:0.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451111"/>
              <criterion comment="pipewire-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire-libs is earlier than 0:0.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451113"/>
              <criterion comment="pipewire-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pipewire-utils is earlier than 0:0.3.6-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451115"/>
              <criterion comment="pipewire-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas is earlier than 0:3.32.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204451117"/>
              <criterion comment="gsettings-desktop-schemas is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gsettings-desktop-schemas-devel is earlier than 0:3.32.0-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204451119"/>
              <criterion comment="gsettings-desktop-schemas-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451121"/>
              <criterion comment="gnome-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session-wayland-session is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451123"/>
              <criterion comment="gnome-session-wayland-session is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-session-xsession is earlier than 0:3.28.1-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451125"/>
              <criterion comment="gnome-session-xsession is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="frei0r-devel is earlier than 0:1.6.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204451127"/>
              <criterion comment="frei0r-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="frei0r-plugins is earlier than 0:1.6.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204451129"/>
              <criterion comment="frei0r-plugins is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="frei0r-plugins-opencv is earlier than 0:1.6.1-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204451131"/>
              <criterion comment="frei0r-plugins-opencv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xdg-desktop-portal is earlier than 0:1.6.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451133"/>
              <criterion comment="xdg-desktop-portal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-remote-desktop is earlier than 0:0.1.8-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204451135"/>
              <criterion comment="gnome-remote-desktop is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gtk-doc is earlier than 0:1.28-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451137"/>
              <criterion comment="gtk-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-shell is earlier than 0:3.32.2-20.el8" test_ref="oval:org.almalinux.alsa:tst:20204451139"/>
              <criterion comment="gnome-shell is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3 is earlier than 0:2.28.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451141"/>
              <criterion comment="webkit2gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-devel is earlier than 0:2.28.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451143"/>
              <criterion comment="webkit2gtk3-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc is earlier than 0:2.28.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451145"/>
              <criterion comment="webkit2gtk3-jsc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="webkit2gtk3-jsc-devel is earlier than 0:2.28.4-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204451147"/>
              <criterion comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20194262008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="potrace is earlier than 0:1.15-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204451149"/>
              <criterion comment="potrace is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451151"/>
              <criterion comment="gvfs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afc is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451153"/>
              <criterion comment="gvfs-afc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-afp is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451155"/>
              <criterion comment="gvfs-afp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-archive is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451157"/>
              <criterion comment="gvfs-archive is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-client is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451159"/>
              <criterion comment="gvfs-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-devel is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451161"/>
              <criterion comment="gvfs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-fuse is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451163"/>
              <criterion comment="gvfs-fuse is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-goa is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451165"/>
              <criterion comment="gvfs-goa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-gphoto2 is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451167"/>
              <criterion comment="gvfs-gphoto2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-mtp is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451169"/>
              <criterion comment="gvfs-mtp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gvfs-smb is earlier than 0:1.36.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204451171"/>
              <criterion comment="gvfs-smb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191517022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="LibRaw is earlier than 0:0.19.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451173"/>
              <criterion comment="LibRaw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="LibRaw-devel is earlier than 0:0.19.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451175"/>
              <criterion comment="LibRaw-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dleyna-renderer is earlier than 0:0.6.0-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204451177"/>
              <criterion comment="dleyna-renderer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsoup is earlier than 0:2.62.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451179"/>
              <criterion comment="libsoup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libsoup-devel is earlier than 0:2.62.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204451181"/>
              <criterion comment="libsoup-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204451182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center is earlier than 0:3.28.2-22.el8" test_ref="oval:org.almalinux.alsa:tst:20204451183"/>
              <criterion comment="gnome-control-center is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-control-center-filesystem is earlier than 0:3.28.2-22.el8" test_ref="oval:org.almalinux.alsa:tst:20204451185"/>
              <criterion comment="gnome-control-center-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnome-settings-daemon is earlier than 0:3.32.0-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204451187"/>
              <criterion comment="gnome-settings-daemon is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gdm is earlier than 1:3.28.3-34.el8" test_ref="oval:org.almalinux.alsa:tst:20204451189"/>
              <criterion comment="gdm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter is earlier than 0:3.32.2-48.el8" test_ref="oval:org.almalinux.alsa:tst:20204451191"/>
              <criterion comment="mutter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mutter-devel is earlier than 0:3.32.2-48.el8" test_ref="oval:org.almalinux.alsa:tst:20204451193"/>
              <criterion comment="mutter-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553158"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204453" version="636">
      <metadata>
        <title>ALSA-2020:4453: vim security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4453" ref_url="https://errata.almalinux.org/8/ALSA-2020-4453.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4453" ref_url="https://access.redhat.com/errata/RHSA-2020:4453" source="RHSA"/>
        <reference ref_id="CVE-2019-20807" ref_url="https://access.redhat.com/security/cve/CVE-2019-20807" source="CVE"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.

Security Fix(es):

* vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode (CVE-2019-20807)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2019-20807" impact="moderate" public="20200208">CVE-2019-20807</cve>
          <bugzilla href="https://bugzilla.redhat.com/1842658" id="1842658">CVE-2019-20807 vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="vim-X11 is earlier than 2:8.0.1763-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204453001"/>
              <criterion comment="vim-X11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-common is earlier than 2:8.0.1763-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204453003"/>
              <criterion comment="vim-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-enhanced is earlier than 2:8.0.1763-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204453005"/>
              <criterion comment="vim-enhanced is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-filesystem is earlier than 2:8.0.1763-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204453007"/>
              <criterion comment="vim-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vim-minimal is earlier than 2:8.0.1763-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204453009"/>
              <criterion comment="vim-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191619010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204464" version="635">
      <metadata>
        <title>ALSA-2020:4464: libxslt security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4464" ref_url="https://errata.almalinux.org/8/ALSA-2020-4464.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4464" ref_url="https://access.redhat.com/errata/RHSA-2020:4464" source="RHSA"/>
        <reference ref_id="CVE-2019-11068" ref_url="https://access.redhat.com/security/cve/CVE-2019-11068" source="CVE"/>
        <reference ref_id="CVE-2019-18197" ref_url="https://access.redhat.com/security/cve/CVE-2019-18197" source="CVE"/>
        <description>libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. 

Security Fix(es):

* libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL (CVE-2019-11068)

* libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure (CVE-2019-18197)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-11068" impact="moderate" public="20190410">CVE-2019-11068</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-18197" impact="moderate" public="20191018">CVE-2019-18197</cve>
          <bugzilla href="https://bugzilla.redhat.com/1709697" id="1709697">CVE-2019-11068 libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770768" id="1770768">CVE-2019-18197 libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libxslt is earlier than 0:1.1.32-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204464001"/>
              <criterion comment="libxslt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766086"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libxslt-devel is earlier than 0:1.1.32-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204464003"/>
              <criterion comment="libxslt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766088"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204465" version="637">
      <metadata>
        <title>ALSA-2020:4465: binutils security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4465" ref_url="https://errata.almalinux.org/8/ALSA-2020-4465.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4465" ref_url="https://access.redhat.com/errata/RHSA-2020:4465" source="RHSA"/>
        <reference ref_id="CVE-2019-17450" ref_url="https://access.redhat.com/security/cve/CVE-2019-17450" source="CVE"/>
        <description>The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

Security Fix(es):

* binutils: denial of service via crafted ELF file (CVE-2019-17450)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674-&gt;CWE-121" href="https://access.redhat.com/security/cve/CVE-2019-17450" impact="low" public="20191008">CVE-2019-17450</cve>
          <bugzilla href="https://bugzilla.redhat.com/1771677" id="1771677">CVE-2019-17450 binutils: denial of service via crafted ELF file</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="binutils is earlier than 0:2.30-79.el8" test_ref="oval:org.almalinux.alsa:tst:20204465001"/>
              <criterion comment="binutils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201797002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="binutils-devel is earlier than 0:2.30-79.el8" test_ref="oval:org.almalinux.alsa:tst:20204465003"/>
              <criterion comment="binutils-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201797004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204469" version="637">
      <metadata>
        <title>ALSA-2020:4469: cups security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4469" ref_url="https://errata.almalinux.org/8/ALSA-2020-4469.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4469" ref_url="https://access.redhat.com/errata/RHSA-2020:4469" source="RHSA"/>
        <reference ref_id="CVE-2020-3898" ref_url="https://access.redhat.com/security/cve/CVE-2020-3898" source="CVE"/>
        <description>The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.

Security Fix(es):

* cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c (CVE-2020-3898)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-3898" impact="low" public="20200420">CVE-2020-3898</cve>
          <bugzilla href="https://bugzilla.redhat.com/1823964" id="1823964">CVE-2020-3898 cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cups is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469001"/>
              <criterion comment="cups is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-client is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469003"/>
              <criterion comment="cups-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-devel is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469005"/>
              <criterion comment="cups-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-filesystem is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469007"/>
              <criterion comment="cups-filesystem is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-ipptool is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469009"/>
              <criterion comment="cups-ipptool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-libs is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469011"/>
              <criterion comment="cups-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cups-lpd is earlier than 1:2.2.6-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204469013"/>
              <criterion comment="cups-lpd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201765014"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204479" version="637">
      <metadata>
        <title>ALSA-2020:4479: libxml2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4479" ref_url="https://errata.almalinux.org/8/ALSA-2020-4479.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4479" ref_url="https://access.redhat.com/errata/RHSA-2020:4479" source="RHSA"/>
        <reference ref_id="CVE-2019-19956" ref_url="https://access.redhat.com/security/cve/CVE-2019-19956" source="CVE"/>
        <reference ref_id="CVE-2019-20388" ref_url="https://access.redhat.com/security/cve/CVE-2019-20388" source="CVE"/>
        <reference ref_id="CVE-2020-7595" ref_url="https://access.redhat.com/security/cve/CVE-2020-7595" source="CVE"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956)

* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)

* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-772" href="https://access.redhat.com/security/cve/CVE-2019-19956" impact="moderate" public="20200108">CVE-2019-19956</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://access.redhat.com/security/cve/CVE-2019-20388" impact="moderate" public="20200121">CVE-2019-20388</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-7595" impact="moderate" public="20200121">CVE-2020-7595</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788856" id="1788856">CVE-2019-19956 libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1799734" id="1799734">CVE-2019-20388 libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1799786" id="1799786">CVE-2020-7595 libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libxml2 is earlier than 0:2.9.7-8.el8" test_ref="oval:org.almalinux.alsa:tst:20204479001"/>
              <criterion comment="libxml2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libxml2-devel is earlier than 0:2.9.7-8.el8" test_ref="oval:org.almalinux.alsa:tst:20204479003"/>
              <criterion comment="libxml2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-libxml2 is earlier than 0:2.9.7-8.el8" test_ref="oval:org.almalinux.alsa:tst:20204479005"/>
              <criterion comment="python3-libxml2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201827006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204481" version="637">
      <metadata>
        <title>ALSA-2020:4481: bluez security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4481" ref_url="https://errata.almalinux.org/8/ALSA-2020-4481.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4481" ref_url="https://access.redhat.com/errata/RHSA-2020:4481" source="RHSA"/>
        <reference ref_id="CVE-2020-0556" ref_url="https://access.redhat.com/security/cve/CVE-2020-0556" source="CVE"/>
        <description>The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts, and pcmcia configuration files. 

Security Fix(es):

* bluez: Improper access control in subsystem could result in privilege escalation and DoS (CVE-2020-0556)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" cwe="(CWE-400|CWE-266)" href="https://access.redhat.com/security/cve/CVE-2020-0556" impact="moderate" public="20200310">CVE-2020-0556</cve>
          <bugzilla href="https://bugzilla.redhat.com/1814293" id="1814293">CVE-2020-0556 bluez: Improper access control in subsystem could result in privilege escalation and DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bluez is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481001"/>
              <criterion comment="bluez is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-cups is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481003"/>
              <criterion comment="bluez-cups is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-hid2hci is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481005"/>
              <criterion comment="bluez-hid2hci is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-libs is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481007"/>
              <criterion comment="bluez-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-libs-devel is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481009"/>
              <criterion comment="bluez-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bluez-obexd is earlier than 0:5.50-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204481011"/>
              <criterion comment="bluez-obexd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201912012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204482" version="636">
      <metadata>
        <title>ALSA-2020:4482: libgcrypt security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4482" ref_url="https://errata.almalinux.org/8/ALSA-2020-4482.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4482" ref_url="https://access.redhat.com/errata/RHSA-2020:4482" source="RHSA"/>
        <reference ref_id="CVE-2019-13627" ref_url="https://access.redhat.com/security/cve/CVE-2019-13627" source="CVE"/>
        <description>The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.

The following packages have been upgraded to a later upstream version: libgcrypt (1.8.5). (BZ#1764918)

Security Fix(es):

* libgcrypt: ECDSA timing attack allowing private key leak (CVE-2019-13627)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-362" href="https://access.redhat.com/security/cve/CVE-2019-13627" impact="moderate" public="20191002">CVE-2019-13627</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764018" id="1764018">CVE-2019-13627 libgcrypt: ECDSA timing attack allowing private key leak</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libgcrypt is earlier than 0:1.8.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204482001"/>
              <criterion comment="libgcrypt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204482002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libgcrypt-devel is earlier than 0:1.8.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204482003"/>
              <criterion comment="libgcrypt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204482004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204483" version="637">
      <metadata>
        <title>ALSA-2020:4483: opensc security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4483" ref_url="https://errata.almalinux.org/8/ALSA-2020-4483.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4483" ref_url="https://access.redhat.com/errata/RHSA-2020:4483" source="RHSA"/>
        <reference ref_id="CVE-2019-15945" ref_url="https://access.redhat.com/security/cve/CVE-2019-15945" source="CVE"/>
        <reference ref_id="CVE-2019-15946" ref_url="https://access.redhat.com/security/cve/CVE-2019-15946" source="CVE"/>
        <reference ref_id="CVE-2019-19479" ref_url="https://access.redhat.com/security/cve/CVE-2019-19479" source="CVE"/>
        <reference ref_id="CVE-2019-19481" ref_url="https://access.redhat.com/security/cve/CVE-2019-19481" source="CVE"/>
        <reference ref_id="CVE-2019-20792" ref_url="https://access.redhat.com/security/cve/CVE-2019-20792" source="CVE"/>
        <description>The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.

The following packages have been upgraded to a later upstream version: opensc (0.20.0). (BZ#1810660)

Security Fix(es):

* opensc: Out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c (CVE-2019-15945)

* opensc: Out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c (CVE-2019-15946)

* opensc: Improper handling of buffer limits for CAC certificates (CVE-2019-19481)

* opensc: Double free in coolkey_free_private_data in libopensc/card-coolkey.c (CVE-2019-20792)

* opensc: Incorrect read operation during parsing of a SETCOS file attribute (CVE-2019-19479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15945" impact="moderate" public="20190906">CVE-2019-15945</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15946" impact="moderate" public="20190906">CVE-2019-15946</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-19479" impact="low" public="20191103">CVE-2019-19479</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-19481" impact="moderate" public="20191030">CVE-2019-19481</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-20792" impact="moderate" public="20200104">CVE-2019-20792</cve>
          <bugzilla href="https://bugzilla.redhat.com/1765222" id="1765222">CVE-2019-15945 opensc: Out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1765229" id="1765229">CVE-2019-15946 opensc: Out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1782519" id="1782519">CVE-2019-19479 opensc: Incorrect read operation during parsing of a SETCOS file attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1782955" id="1782955">CVE-2019-19481 opensc: Improper handling of buffer limits for CAC certificates</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1837946" id="1837946">CVE-2019-20792 opensc: Double free in coolkey_free_private_data in libopensc/card-coolkey.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="opensc is earlier than 0:0.20.0-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204483001"/>
          <criterion comment="opensc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204483002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204484" version="635">
      <metadata>
        <title>ALSA-2020:4484: expat security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4484" ref_url="https://errata.almalinux.org/8/ALSA-2020-4484.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4484" ref_url="https://access.redhat.com/errata/RHSA-2020:4484" source="RHSA"/>
        <reference ref_id="CVE-2018-20843" ref_url="https://access.redhat.com/security/cve/CVE-2018-20843" source="CVE"/>
        <reference ref_id="CVE-2019-15903" ref_url="https://access.redhat.com/security/cve/CVE-2019-15903" source="CVE"/>
        <description>Expat is a C library for parsing XML documents.

Security Fix(es):

* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)

* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-20843" impact="moderate" public="20190624">CVE-2018-20843</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="(CWE-122|CWE-125)" href="https://access.redhat.com/security/cve/CVE-2019-15903" impact="low" public="20190904">CVE-2019-15903</cve>
          <bugzilla href="https://bugzilla.redhat.com/1723723" id="1723723">CVE-2018-20843 expat: large number of colons in input makes parser consume high amount of resources, leading to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1752592" id="1752592">CVE-2019-15903 expat: heap-based buffer over-read via crafted XML input</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="expat is earlier than 0:2.2.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204484001"/>
              <criterion comment="expat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204484002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="expat-devel is earlier than 0:2.2.5-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204484003"/>
              <criterion comment="expat-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204484004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204490" version="635">
      <metadata>
        <title>ALSA-2020:4490: gnupg2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4490" ref_url="https://errata.almalinux.org/8/ALSA-2020-4490.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4490" ref_url="https://access.redhat.com/errata/RHSA-2020:4490" source="RHSA"/>
        <reference ref_id="CVE-2018-1000858" ref_url="https://access.redhat.com/security/cve/CVE-2018-1000858" source="CVE"/>
        <reference ref_id="CVE-2019-13050" ref_url="https://access.redhat.com/security/cve/CVE-2019-13050" source="CVE"/>
        <description>The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.

The following packages have been upgraded to a later upstream version: gnupg2 (2.2.20). (BZ#1663944)

Security Fix(es):

* GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS (CVE-2019-13050)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-352" href="https://access.redhat.com/security/cve/CVE-2018-1000858" impact="moderate" public="20181123">CVE-2018-1000858</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-297" href="https://access.redhat.com/security/cve/CVE-2019-13050" impact="moderate" public="20190629">CVE-2019-13050</cve>
          <bugzilla href="https://bugzilla.redhat.com/1663917" id="1663917">CVE-2018-1000858 gnupg2: Cross site request forgery in dirmngr resulting in an information disclosure or denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1726146" id="1726146">CVE-2019-13050 GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnupg2 is earlier than 0:2.2.20-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204490001"/>
              <criterion comment="gnupg2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204490002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnupg2-smime is earlier than 0:2.2.20-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204490003"/>
              <criterion comment="gnupg2-smime is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204490004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204497" version="637">
      <metadata>
        <title>ALSA-2020:4497: cyrus-sasl security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4497" ref_url="https://errata.almalinux.org/8/ALSA-2020-4497.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4497" ref_url="https://access.redhat.com/errata/RHSA-2020:4497" source="RHSA"/>
        <reference ref_id="CVE-2019-19906" ref_url="https://access.redhat.com/security/cve/CVE-2019-19906" source="CVE"/>
        <description>The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.

Security Fix(es):

* cyrus-sasl: denial of service in _sasl_add_string function (CVE-2019-19906)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19906" impact="moderate" public="20191128">CVE-2019-19906</cve>
          <bugzilla href="https://bugzilla.redhat.com/1791854" id="1791854">CVE-2019-19906 cyrus-sasl: denial of service in _sasl_add_string function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cyrus-sasl is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497001"/>
              <criterion comment="cyrus-sasl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-devel is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497003"/>
              <criterion comment="cyrus-sasl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-gs2 is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497005"/>
              <criterion comment="cyrus-sasl-gs2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-gssapi is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497007"/>
              <criterion comment="cyrus-sasl-gssapi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-ldap is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497009"/>
              <criterion comment="cyrus-sasl-ldap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-lib is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497011"/>
              <criterion comment="cyrus-sasl-lib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-md5 is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497013"/>
              <criterion comment="cyrus-sasl-md5 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-ntlm is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497015"/>
              <criterion comment="cyrus-sasl-ntlm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-plain is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497017"/>
              <criterion comment="cyrus-sasl-plain is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-scram is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497019"/>
              <criterion comment="cyrus-sasl-scram is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-sasl-sql is earlier than 0:2.1.27-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204497021"/>
              <criterion comment="cyrus-sasl-sql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204497022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204500" version="637">
      <metadata>
        <title>ALSA-2020:4500: bind security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4500" ref_url="https://errata.almalinux.org/8/ALSA-2020-4500.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4500" ref_url="https://access.redhat.com/errata/RHSA-2020:4500" source="RHSA"/>
        <reference ref_id="CVE-2020-8619" ref_url="https://access.redhat.com/security/cve/CVE-2020-8619" source="CVE"/>
        <reference ref_id="CVE-2020-8622" ref_url="https://access.redhat.com/security/cve/CVE-2020-8622" source="CVE"/>
        <reference ref_id="CVE-2020-8623" ref_url="https://access.redhat.com/security/cve/CVE-2020-8623" source="CVE"/>
        <reference ref_id="CVE-2020-8624" ref_url="https://access.redhat.com/security/cve/CVE-2020-8624" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

The following packages have been upgraded to a later upstream version: bind (9.11.20). (BZ#1818785)

Security Fix(es):

* bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c (CVE-2020-8619)

* bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622)

* bind: remotely triggerable assertion failure in pk11.c (CVE-2020-8623)

* bind: incorrect enforcement of update-policy rules of type "subdomain" (CVE-2020-8624)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2020-8619" impact="moderate" public="20200617">CVE-2020-8619</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8622" impact="moderate" public="20200820">CVE-2020-8622</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8623" impact="moderate" public="20200820">CVE-2020-8623</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8624" impact="moderate" public="20200820">CVE-2020-8624</cve>
          <bugzilla href="https://bugzilla.redhat.com/1847244" id="1847244">CVE-2020-8619 bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1869473" id="1869473">CVE-2020-8622 bind: truncated TSIG response can lead to an assertion failure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1869477" id="1869477">CVE-2020-8623 bind: remotely triggerable assertion failure in pk11.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1869480" id="1869480">CVE-2020-8624 bind: incorrect enforcement of update-policy rules of type "subdomain"</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.20-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204500033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204508" version="635">
      <metadata>
        <title>ALSA-2020:4508: libsolv security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4508" ref_url="https://errata.almalinux.org/8/ALSA-2020-4508.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4508" ref_url="https://access.redhat.com/errata/RHSA-2020:4508" source="RHSA"/>
        <reference ref_id="CVE-2019-20387" ref_url="https://access.redhat.com/security/cve/CVE-2019-20387" source="CVE"/>
        <description>The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.

The following packages have been upgraded to a later upstream version: libsolv (0.7.11). (BZ#1809106)

Security Fix(es):

* libsolv: out-of-bounds read in repodata_schema2id in repodata.c (CVE-2019-20387)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20387" impact="moderate" public="20200121">CVE-2019-20387</cve>
          <bugzilla href="https://bugzilla.redhat.com/1797072" id="1797072">CVE-2019-20387 libsolv: out-of-bounds read in repodata_schema2id in repodata.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libsolv is earlier than 0:0.7.11-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204508001"/>
              <criterion comment="libsolv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193583002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-solv is earlier than 0:0.7.11-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204508003"/>
              <criterion comment="python3-solv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204508004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204514" version="637">
      <metadata>
        <title>ALSA-2020:4514: openssl security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4514" ref_url="https://errata.almalinux.org/8/ALSA-2020-4514.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4514" ref_url="https://access.redhat.com/errata/RHSA-2020:4514" source="RHSA"/>
        <reference ref_id="CVE-2019-1551" ref_url="https://access.redhat.com/security/cve/CVE-2019-1551" source="CVE"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

The following packages have been upgraded to a later upstream version: openssl (1.1.1g). (BZ#1817593)

Security Fix(es):

* openssl: Integer overflow in RSAZ modular exponentiation on x86_64 (CVE-2019-1551)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-1551" impact="low" public="20191206">CVE-2019-1551</cve>
          <bugzilla href="https://bugzilla.redhat.com/1780995" id="1780995">CVE-2019-1551 openssl: Integer overflow in RSAZ modular exponentiation on x86_64</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openssl is earlier than 1:1.1.1g-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204514001"/>
              <criterion comment="openssl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-devel is earlier than 1:1.1.1g-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204514003"/>
              <criterion comment="openssl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-libs is earlier than 1:1.1.1g-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204514005"/>
              <criterion comment="openssl-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-perl is earlier than 1:1.1.1g-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204514007"/>
              <criterion comment="openssl-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204539" version="636">
      <metadata>
        <title>ALSA-2020:4539: pcre2 security and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4539" ref_url="https://errata.almalinux.org/8/ALSA-2020-4539.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4539" ref_url="https://access.redhat.com/errata/RHSA-2020:4539" source="RHSA"/>
        <reference ref_id="CVE-2019-20454" ref_url="https://access.redhat.com/security/cve/CVE-2019-20454" source="CVE"/>
        <description>The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. 

Security Fix(es):

* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-20454" impact="moderate" public="20190728">CVE-2019-20454</cve>
          <bugzilla href="https://bugzilla.redhat.com/1735494" id="1735494">CVE-2019-20454 pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pcre2 is earlier than 0:10.32-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204539001"/>
              <criterion comment="pcre2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204539002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcre2-devel is earlier than 0:10.32-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204539003"/>
              <criterion comment="pcre2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204539004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcre2-tools is earlier than 0:10.32-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204539005"/>
              <criterion comment="pcre2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204539006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcre2-utf16 is earlier than 0:10.32-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204539007"/>
              <criterion comment="pcre2-utf16 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204539008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pcre2-utf32 is earlier than 0:10.32-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204539009"/>
              <criterion comment="pcre2-utf32 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204539010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204542" version="636">
      <metadata>
        <title>ALSA-2020:4542: cryptsetup security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4542" ref_url="https://errata.almalinux.org/8/ALSA-2020-4542.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4542" ref_url="https://access.redhat.com/errata/RHSA-2020:4542" source="RHSA"/>
        <reference ref_id="CVE-2020-14382" ref_url="https://access.redhat.com/security/cve/CVE-2020-14382" source="CVE"/>
        <description>The cryptsetup packages provide a utility for setting up disk encryption using the dm-crypt kernel module.

The following packages have been upgraded to a later upstream version: cryptsetup (2.3.3). (BZ#1796826)

Security Fix(es):

* cryptsetup: Out-of-bounds write when validating segments (CVE-2020-14382)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-14382" impact="moderate" public="20200903">CVE-2020-14382</cve>
          <bugzilla href="https://bugzilla.redhat.com/1874712" id="1874712">CVE-2020-14382 cryptsetup: Out-of-bounds write when validating segments</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cryptsetup is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542001"/>
              <criterion comment="cryptsetup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cryptsetup-devel is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542003"/>
              <criterion comment="cryptsetup-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cryptsetup-libs is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542005"/>
              <criterion comment="cryptsetup-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cryptsetup-reencrypt is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542007"/>
              <criterion comment="cryptsetup-reencrypt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="integritysetup is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542009"/>
              <criterion comment="integritysetup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="veritysetup is earlier than 0:2.3.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204542011"/>
              <criterion comment="veritysetup is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204542012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204545" version="635">
      <metadata>
        <title>ALSA-2020:4545: libssh security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4545" ref_url="https://errata.almalinux.org/8/ALSA-2020-4545.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4545" ref_url="https://access.redhat.com/errata/RHSA-2020:4545" source="RHSA"/>
        <reference ref_id="CVE-2019-14889" ref_url="https://access.redhat.com/security/cve/CVE-2019-14889" source="CVE"/>
        <reference ref_id="CVE-2020-1730" ref_url="https://access.redhat.com/security/cve/CVE-2020-1730" source="CVE"/>
        <description>libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.

The following packages have been upgraded to a later upstream version: libssh (0.9.4). (BZ#1804797)

Security Fix(es):

* libssh: denial of service when handling AES-CTR (or DES) ciphers (CVE-2020-1730)

* libssh: unsanitized location in scp could lead to unwanted command execution (CVE-2019-14889)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2019-14889" impact="low" public="20191205">CVE-2019-14889</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-1730" impact="moderate" public="20200409:0900">CVE-2020-1730</cve>
          <bugzilla href="https://bugzilla.redhat.com/1772523" id="1772523">CVE-2019-14889 libssh: unsanitized location in scp could lead to unwanted command execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801998" id="1801998">CVE-2020-1730 libssh: denial of service when handling AES-CTR (or DES) ciphers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libssh is earlier than 0:0.9.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204545001"/>
              <criterion comment="libssh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204545002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libssh-config is earlier than 0:0.9.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204545003"/>
              <criterion comment="libssh-config is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204545004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libssh-devel is earlier than 0:0.9.4-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204545005"/>
              <criterion comment="libssh-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204545006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204547" version="638">
      <metadata>
        <title>ALSA-2020:4547: libpcap security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4547" ref_url="https://errata.almalinux.org/8/ALSA-2020-4547.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4547" ref_url="https://access.redhat.com/errata/RHSA-2020:4547" source="RHSA"/>
        <reference ref_id="CVE-2019-15165" ref_url="https://access.redhat.com/security/cve/CVE-2019-15165" source="CVE"/>
        <description>The libpcap packages provide a portable framework for low-level network monitoring. The libpcap library provides network statistics collection, security monitoring, and network debugging.

The following packages have been upgraded to a later upstream version: libpcap (1.9.1). (BZ#1806422)

Security Fix(es):

* libpcap: Resource exhaustion during PHB header length validation (CVE-2019-15165)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-15165" impact="low" public="20190920">CVE-2019-15165</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760618" id="1760618">CVE-2019-15165 libpcap: Resource exhaustion during PHB header length validation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libpcap is earlier than 14:1.9.1-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204547001"/>
              <criterion comment="libpcap is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204547002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libpcap-devel is earlier than 14:1.9.1-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204547003"/>
              <criterion comment="libpcap-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204547004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204553" version="637">
      <metadata>
        <title>ALSA-2020:4553: systemd security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4553" ref_url="https://errata.almalinux.org/8/ALSA-2020-4553.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4553" ref_url="https://access.redhat.com/errata/RHSA-2020:4553" source="RHSA"/>
        <reference ref_id="CVE-2019-20386" ref_url="https://access.redhat.com/security/cve/CVE-2019-20386" source="CVE"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-20386" impact="low" public="20200122">CVE-2019-20386</cve>
          <bugzilla href="https://bugzilla.redhat.com/1793979" id="1793979">CVE-2019-20386 systemd: memory leak in button_open() in login/logind-button.c when udev events are received</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="systemd is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553001"/>
              <criterion comment="systemd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-container is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553003"/>
              <criterion comment="systemd-container is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-devel is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553005"/>
              <criterion comment="systemd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-journal-remote is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553007"/>
              <criterion comment="systemd-journal-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-libs is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553009"/>
              <criterion comment="systemd-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-pam is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553011"/>
              <criterion comment="systemd-pam is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-tests is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553013"/>
              <criterion comment="systemd-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="systemd-udev is earlier than 0:239-40.el8" test_ref="oval:org.almalinux.alsa:tst:20204553015"/>
              <criterion comment="systemd-udev is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190990016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204568" version="637">
      <metadata>
        <title>ALSA-2020:4568: libldb security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4568" ref_url="https://errata.almalinux.org/8/ALSA-2020-4568.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4568" ref_url="https://access.redhat.com/errata/RHSA-2020:4568" source="RHSA"/>
        <reference ref_id="CVE-2020-10730" ref_url="https://access.redhat.com/security/cve/CVE-2020-10730" source="CVE"/>
        <description>The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.

The following packages have been upgraded to a later upstream version: libldb (2.1.3). (BZ#1817567)

Security Fix(es):

* samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results (CVE-2020-10730)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10730" impact="moderate" public="20200702">CVE-2020-10730</cve>
          <bugzilla href="https://bugzilla.redhat.com/1849489" id="1849489">CVE-2020-10730 samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="ldb-tools is earlier than 0:2.1.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204568001"/>
              <criterion comment="ldb-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204568002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libldb is earlier than 0:2.1.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204568003"/>
              <criterion comment="libldb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204568004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libldb-devel is earlier than 0:2.1.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204568005"/>
              <criterion comment="libldb-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204568006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-ldb is earlier than 0:2.1.3-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204568007"/>
              <criterion comment="python3-ldb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204568008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204599" version="636">
      <metadata>
        <title>ALSA-2020:4599: curl security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4599" ref_url="https://errata.almalinux.org/8/ALSA-2020-4599.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4599" ref_url="https://access.redhat.com/errata/RHSA-2020:4599" source="RHSA"/>
        <reference ref_id="CVE-2020-8177" ref_url="https://access.redhat.com/security/cve/CVE-2020-8177" source="CVE"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: Incorrect argument check can allow remote servers to overwrite local files (CVE-2020-8177)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L" href="https://access.redhat.com/security/cve/CVE-2020-8177" impact="moderate" public="20200624">CVE-2020-8177</cve>
          <bugzilla href="https://bugzilla.redhat.com/1847915" id="1847915">CVE-2020-8177 curl: Incorrect argument check can allow remote servers to overwrite local files</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="curl is earlier than 0:7.61.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204599001"/>
              <criterion comment="curl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl is earlier than 0:7.61.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204599003"/>
              <criterion comment="libcurl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-devel is earlier than 0:7.61.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204599005"/>
              <criterion comment="libcurl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcurl-minimal is earlier than 0:7.61.1-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204599007"/>
              <criterion comment="libcurl-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193701008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204605" version="637">
      <metadata>
        <title>ALSA-2020:4605: resource-agents security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4605" ref_url="https://errata.almalinux.org/8/ALSA-2020-4605.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4605" ref_url="https://access.redhat.com/errata/RHSA-2020:4605" source="RHSA"/>
        <reference ref_id="CVE-2020-11078" ref_url="https://access.redhat.com/security/cve/CVE-2020-11078" source="CVE"/>
        <description>The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.

Security Fix(es):

* python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function (CVE-2020-11078)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" cwe="CWE-113" href="https://access.redhat.com/security/cve/CVE-2020-11078" impact="low" public="20200520">CVE-2020-11078</cve>
          <bugzilla href="https://bugzilla.redhat.com/1845937" id="1845937">CVE-2020-11078 python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::resilientstorage</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="resource-agents is earlier than 0:4.1.1-68.el8" test_ref="oval:org.almalinux.alsa:tst:20204605001"/>
              <criterion comment="resource-agents is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204605002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resource-agents-aliyun is earlier than 0:4.1.1-68.el8" test_ref="oval:org.almalinux.alsa:tst:20204605003"/>
              <criterion comment="resource-agents-aliyun is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204605004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="resource-agents-gcp is earlier than 0:4.1.1-68.el8" test_ref="oval:org.almalinux.alsa:tst:20204605005"/>
              <criterion comment="resource-agents-gcp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204605006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204609" version="638">
      <metadata>
        <title>ALSA-2020:4609: kernel-rt security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4609" ref_url="https://errata.almalinux.org/8/ALSA-2020-4609.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4609" ref_url="https://access.redhat.com/errata/RHSA-2020:4609" source="RHSA"/>
        <reference ref_id="CVE-2019-15917" ref_url="https://access.redhat.com/security/cve/CVE-2019-15917" source="CVE"/>
        <reference ref_id="CVE-2019-15925" ref_url="https://access.redhat.com/security/cve/CVE-2019-15925" source="CVE"/>
        <reference ref_id="CVE-2019-16231" ref_url="https://access.redhat.com/security/cve/CVE-2019-16231" source="CVE"/>
        <reference ref_id="CVE-2019-16233" ref_url="https://access.redhat.com/security/cve/CVE-2019-16233" source="CVE"/>
        <reference ref_id="CVE-2019-18808" ref_url="https://access.redhat.com/security/cve/CVE-2019-18808" source="CVE"/>
        <reference ref_id="CVE-2019-18809" ref_url="https://access.redhat.com/security/cve/CVE-2019-18809" source="CVE"/>
        <reference ref_id="CVE-2019-19046" ref_url="https://access.redhat.com/security/cve/CVE-2019-19046" source="CVE"/>
        <reference ref_id="CVE-2019-19056" ref_url="https://access.redhat.com/security/cve/CVE-2019-19056" source="CVE"/>
        <reference ref_id="CVE-2019-19062" ref_url="https://access.redhat.com/security/cve/CVE-2019-19062" source="CVE"/>
        <reference ref_id="CVE-2019-19063" ref_url="https://access.redhat.com/security/cve/CVE-2019-19063" source="CVE"/>
        <reference ref_id="CVE-2019-19068" ref_url="https://access.redhat.com/security/cve/CVE-2019-19068" source="CVE"/>
        <reference ref_id="CVE-2019-19072" ref_url="https://access.redhat.com/security/cve/CVE-2019-19072" source="CVE"/>
        <reference ref_id="CVE-2019-19319" ref_url="https://access.redhat.com/security/cve/CVE-2019-19319" source="CVE"/>
        <reference ref_id="CVE-2019-19332" ref_url="https://access.redhat.com/security/cve/CVE-2019-19332" source="CVE"/>
        <reference ref_id="CVE-2019-19447" ref_url="https://access.redhat.com/security/cve/CVE-2019-19447" source="CVE"/>
        <reference ref_id="CVE-2019-19524" ref_url="https://access.redhat.com/security/cve/CVE-2019-19524" source="CVE"/>
        <reference ref_id="CVE-2019-19533" ref_url="https://access.redhat.com/security/cve/CVE-2019-19533" source="CVE"/>
        <reference ref_id="CVE-2019-19537" ref_url="https://access.redhat.com/security/cve/CVE-2019-19537" source="CVE"/>
        <reference ref_id="CVE-2019-19543" ref_url="https://access.redhat.com/security/cve/CVE-2019-19543" source="CVE"/>
        <reference ref_id="CVE-2019-19767" ref_url="https://access.redhat.com/security/cve/CVE-2019-19767" source="CVE"/>
        <reference ref_id="CVE-2019-19770" ref_url="https://access.redhat.com/security/cve/CVE-2019-19770" source="CVE"/>
        <reference ref_id="CVE-2019-20054" ref_url="https://access.redhat.com/security/cve/CVE-2019-20054" source="CVE"/>
        <reference ref_id="CVE-2019-20636" ref_url="https://access.redhat.com/security/cve/CVE-2019-20636" source="CVE"/>
        <reference ref_id="CVE-2019-9455" ref_url="https://access.redhat.com/security/cve/CVE-2019-9455" source="CVE"/>
        <reference ref_id="CVE-2019-9458" ref_url="https://access.redhat.com/security/cve/CVE-2019-9458" source="CVE"/>
        <reference ref_id="CVE-2020-0305" ref_url="https://access.redhat.com/security/cve/CVE-2020-0305" source="CVE"/>
        <reference ref_id="CVE-2020-10732" ref_url="https://access.redhat.com/security/cve/CVE-2020-10732" source="CVE"/>
        <reference ref_id="CVE-2020-10751" ref_url="https://access.redhat.com/security/cve/CVE-2020-10751" source="CVE"/>
        <reference ref_id="CVE-2020-10774" ref_url="https://access.redhat.com/security/cve/CVE-2020-10774" source="CVE"/>
        <reference ref_id="CVE-2020-10942" ref_url="https://access.redhat.com/security/cve/CVE-2020-10942" source="CVE"/>
        <reference ref_id="CVE-2020-11565" ref_url="https://access.redhat.com/security/cve/CVE-2020-11565" source="CVE"/>
        <reference ref_id="CVE-2020-11668" ref_url="https://access.redhat.com/security/cve/CVE-2020-11668" source="CVE"/>
        <reference ref_id="CVE-2020-12655" ref_url="https://access.redhat.com/security/cve/CVE-2020-12655" source="CVE"/>
        <reference ref_id="CVE-2020-12659" ref_url="https://access.redhat.com/security/cve/CVE-2020-12659" source="CVE"/>
        <reference ref_id="CVE-2020-12770" ref_url="https://access.redhat.com/security/cve/CVE-2020-12770" source="CVE"/>
        <reference ref_id="CVE-2020-12826" ref_url="https://access.redhat.com/security/cve/CVE-2020-12826" source="CVE"/>
        <reference ref_id="CVE-2020-14381" ref_url="https://access.redhat.com/security/cve/CVE-2020-14381" source="CVE"/>
        <reference ref_id="CVE-2020-25641" ref_url="https://access.redhat.com/security/cve/CVE-2020-25641" source="CVE"/>
        <reference ref_id="CVE-2020-8647" ref_url="https://access.redhat.com/security/cve/CVE-2020-8647" source="CVE"/>
        <reference ref_id="CVE-2020-8648" ref_url="https://access.redhat.com/security/cve/CVE-2020-8648" source="CVE"/>
        <reference ref_id="CVE-2020-8649" ref_url="https://access.redhat.com/security/cve/CVE-2020-8649" source="CVE"/>
        <reference ref_id="CVE-2021-3715" ref_url="https://access.redhat.com/security/cve/CVE-2021-3715" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)

* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)

* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)

* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)

* kernel: Denial Of Service in the __ipmi_bmc_register()  (CVE-2019-19046)

* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)

* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)

* kernel: use-after-free in ext4_put_super (CVE-2019-19447)

* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)

* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)

* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)

* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)

* kernel: use-after-free in debugfs_remove (CVE-2019-19770)

* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)

* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)

* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)

* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)

* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)

* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)

* kernel: SELinux netlink permission check bypass (CVE-2020-10751)

* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)

* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)

* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)

* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)

* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)

* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)

* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)

* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)

* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)

* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)

* kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)

* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)

* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)

* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)

* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)

* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)

* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)

* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)

* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)

* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)

* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15917" impact="moderate" public="20190904">CVE-2019-15917</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-15925" impact="moderate" public="20190904">CVE-2019-15925</cve>
          <cve cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16231" impact="low" public="20190911">CVE-2019-16231</cve>
          <cve cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2019-16233" impact="low" public="20190909">CVE-2019-16233</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-18808" impact="moderate" public="20191118">CVE-2019-18808</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-18809" impact="low" public="20191127">CVE-2019-18809</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19046" impact="moderate" public="20191118">CVE-2019-19046</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19056" impact="low" public="20191005">CVE-2019-19056</cve>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19062" impact="low" public="20191121">CVE-2019-19062</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19063" impact="low" public="20191121">CVE-2019-19063</cve>
          <cve cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19068" impact="low" public="20191121">CVE-2019-19068</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-19072" impact="low" public="20191121">CVE-2019-19072</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-19319" impact="moderate" public="20191127">CVE-2019-19319</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-19332" impact="moderate" public="20191203">CVE-2019-19332</cve>
          <cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19447" impact="moderate" public="20191210">CVE-2019-19447</cve>
          <cve cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19524" impact="moderate" public="20191115">CVE-2019-19524</cve>
          <cve cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-772-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-19533" impact="low" public="20190821">CVE-2019-19533</cve>
          <cve cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-362" href="https://access.redhat.com/security/cve/CVE-2019-19537" impact="moderate" public="20190812">CVE-2019-19537</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19543" impact="moderate" public="20190319">CVE-2019-19543</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19767" impact="moderate" public="20191107">CVE-2019-19767</cve>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-19770" impact="moderate" public="20191129">CVE-2019-19770</cve>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-20054" impact="low" public="20191228">CVE-2019-20054</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-20636" impact="moderate" public="20200404">CVE-2019-20636</cve>
          <cve cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-9455" impact="low" public="20190903">CVE-2019-9455</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-9458" impact="moderate" public="20190903">CVE-2019-9458</cve>
          <cve cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-0305" impact="moderate" public="20200717">CVE-2020-0305</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-10732" impact="moderate" public="20200501">CVE-2020-10732</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" cwe="CWE-349" href="https://access.redhat.com/security/cve/CVE-2020-10751" impact="moderate" public="20200427:1400">CVE-2020-10751</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-909" href="https://access.redhat.com/security/cve/CVE-2020-10774" impact="low" public="20200615">CVE-2020-10774</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-20-&gt;CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-10942" impact="low" public="20200322">CVE-2020-10942</cve>
          <cve cvss3="6.0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-11565" impact="moderate" public="20200401">CVE-2020-11565</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-20-&gt;CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-11668" impact="moderate" public="20200103">CVE-2020-11668</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-12655" impact="low" public="20200302">CVE-2020-12655</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-12659" impact="moderate" public="20200505">CVE-2020-12659</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-401-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-12770" impact="moderate" public="20200414">CVE-2020-12770</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-94" href="https://access.redhat.com/security/cve/CVE-2020-12826" impact="moderate" public="20200512:0540">CVE-2020-12826</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-14381" impact="moderate" public="20200507:1900">CVE-2020-14381</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-25641" impact="moderate" public="20200930:0024">CVE-2020-25641</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-8647" impact="moderate" public="20200130">CVE-2020-8647</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8648" impact="moderate" public="20200130">CVE-2020-8648</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8649" impact="moderate" public="20200130">CVE-2020-8649</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2021-3715" impact="important" public="20210907:0825">CVE-2021-3715</cve>
          <bugzilla href="https://bugzilla.redhat.com/1759052" id="1759052">CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760100" id="1760100">CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760310" id="1760310">CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760420" id="1760420">CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774946" id="1774946">CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774963" id="1774963">CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1774988" id="1774988">CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775015" id="1775015">CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775021" id="1775021">CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1775097" id="1775097">CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777418" id="1777418">CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777449" id="1777449">CVE-2019-18809 kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1779594" id="1779594">CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781679" id="1781679">CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1781810" id="1781810">CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783459" id="1783459">CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783534" id="1783534">CVE-2019-19533 kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1783561" id="1783561">CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1784130" id="1784130">CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786160" id="1786160">CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786179" id="1786179">CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1790063" id="1790063">CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802555" id="1802555">CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802559" id="1802559">CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802563" id="1802563">CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1817718" id="1817718">CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1819377" id="1819377">CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1819399" id="1819399">CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1822077" id="1822077">CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824059" id="1824059">CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824792" id="1824792">CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824918" id="1824918">CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1831399" id="1831399">CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832543" id="1832543">CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1832876" id="1832876">CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1834845" id="1834845">CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1839634" id="1839634">CVE-2020-10751 kernel: SELinux netlink permission check bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1846964" id="1846964">CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1860065" id="1860065">CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1874311" id="1874311">CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1881424" id="1881424">CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1993988" id="1993988">CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.rt7.54.el8 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204431051"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.rt7.54.el8 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204609026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-240.rt7.54.el8" test_ref="oval:org.almalinux.alsa:tst:20204609023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204619" version="636">
      <metadata>
        <title>ALSA-2020:4619: frr security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4619" ref_url="https://errata.almalinux.org/8/ALSA-2020-4619.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4619" ref_url="https://access.redhat.com/errata/RHSA-2020:4619" source="RHSA"/>
        <reference ref_id="CVE-2020-12831" ref_url="https://access.redhat.com/security/cve/CVE-2020-12831" source="CVE"/>
        <description>FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. 

Security Fix(es):

* frr: default permission issue eases information leaks (CVE-2020-12831)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-276" href="https://access.redhat.com/security/cve/CVE-2020-12831" impact="moderate" public="20200503">CVE-2020-12831</cve>
          <bugzilla href="https://bugzilla.redhat.com/1830805" id="1830805">CVE-2020-12831 frr: default permission issue eases information leaks</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="frr is earlier than 0:7.0-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204619001"/>
              <criterion comment="frr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204619002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="frr-contrib is earlier than 0:7.0-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204619003"/>
              <criterion comment="frr-contrib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204619004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204625" version="636">
      <metadata>
        <title>ALSA-2020:4625: spamassassin security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4625" ref_url="https://errata.almalinux.org/8/ALSA-2020-4625.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4625" ref_url="https://access.redhat.com/errata/RHSA-2020:4625" source="RHSA"/>
        <reference ref_id="CVE-2018-11805" ref_url="https://access.redhat.com/security/cve/CVE-2018-11805" source="CVE"/>
        <reference ref_id="CVE-2019-12420" ref_url="https://access.redhat.com/security/cve/CVE-2019-12420" source="CVE"/>
        <reference ref_id="CVE-2020-1930" ref_url="https://access.redhat.com/security/cve/CVE-2020-1930" source="CVE"/>
        <reference ref_id="CVE-2020-1931" ref_url="https://access.redhat.com/security/cve/CVE-2020-1931" source="CVE"/>
        <description>The SpamAssassin tool provides a way to reduce unsolicited commercial email (spam) from incoming email.

Security Fix(es):

* spamassassin: crafted configuration files can run system commands without any output or errors (CVE-2018-11805)

* spamassassin: crafted email message can lead to DoS (CVE-2019-12420)

* spamassassin: command injection via crafted configuration file (CVE-2020-1930)

* spamassassin: command injection via crafted configuration file (CVE-2020-1931)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2018-11805" impact="moderate" public="20191212">CVE-2018-11805</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-12420" impact="moderate" public="20191212">CVE-2019-12420</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2020-1930" impact="moderate" public="20200130">CVE-2020-1930</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://access.redhat.com/security/cve/CVE-2020-1931" impact="moderate" public="20200129">CVE-2020-1931</cve>
          <bugzilla href="https://bugzilla.redhat.com/1784974" id="1784974">CVE-2018-11805 spamassassin: crafted configuration files can run system commands without any output or errors</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1784984" id="1784984">CVE-2019-12420 spamassassin: crafted email message can lead to DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802975" id="1802975">CVE-2020-1931 spamassassin: command injection via crafted configuration file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1802977" id="1802977">CVE-2020-1930 spamassassin: command injection via crafted configuration file</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="spamassassin is earlier than 0:3.4.2-10.el8" test_ref="oval:org.almalinux.alsa:tst:20204625001"/>
          <criterion comment="spamassassin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204625002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204627" version="638">
      <metadata>
        <title>ALSA-2020:4627: SDL security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4627" ref_url="https://errata.almalinux.org/8/ALSA-2020-4627.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4627" ref_url="https://access.redhat.com/errata/RHSA-2020:4627" source="RHSA"/>
        <reference ref_id="CVE-2019-7572" ref_url="https://access.redhat.com/security/cve/CVE-2019-7572" source="CVE"/>
        <reference ref_id="CVE-2019-7573" ref_url="https://access.redhat.com/security/cve/CVE-2019-7573" source="CVE"/>
        <reference ref_id="CVE-2019-7574" ref_url="https://access.redhat.com/security/cve/CVE-2019-7574" source="CVE"/>
        <reference ref_id="CVE-2019-7575" ref_url="https://access.redhat.com/security/cve/CVE-2019-7575" source="CVE"/>
        <reference ref_id="CVE-2019-7576" ref_url="https://access.redhat.com/security/cve/CVE-2019-7576" source="CVE"/>
        <reference ref_id="CVE-2019-7577" ref_url="https://access.redhat.com/security/cve/CVE-2019-7577" source="CVE"/>
        <reference ref_id="CVE-2019-7578" ref_url="https://access.redhat.com/security/cve/CVE-2019-7578" source="CVE"/>
        <reference ref_id="CVE-2019-7635" ref_url="https://access.redhat.com/security/cve/CVE-2019-7635" source="CVE"/>
        <reference ref_id="CVE-2019-7636" ref_url="https://access.redhat.com/security/cve/CVE-2019-7636" source="CVE"/>
        <reference ref_id="CVE-2019-7637" ref_url="https://access.redhat.com/security/cve/CVE-2019-7637" source="CVE"/>
        <reference ref_id="CVE-2019-7638" ref_url="https://access.redhat.com/security/cve/CVE-2019-7638" source="CVE"/>
        <description>Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.

Security Fix(es):

* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572)

* SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575)

* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636)

* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637)

* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638)

* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573)

* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574)

* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576)

* SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577)

* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578)

* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7572" impact="moderate" public="20190206">CVE-2019-7572</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7573" impact="low" public="20190206">CVE-2019-7573</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7574" impact="low" public="20190207">CVE-2019-7574</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7575" impact="moderate" public="20190206">CVE-2019-7575</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7576" impact="low" public="20190205">CVE-2019-7576</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-7577" impact="low" public="20190206">CVE-2019-7577</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7578" impact="low" public="20190206">CVE-2019-7578</cve>
          <cve cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7635" impact="low" public="20190207">CVE-2019-7635</cve>
          <cve cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7636" impact="moderate" public="20190207">CVE-2019-7636</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2019-7637" impact="moderate" public="20190207">CVE-2019-7637</cve>
          <cve cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-7638" impact="moderate" public="20190208">CVE-2019-7638</cve>
          <bugzilla href="https://bugzilla.redhat.com/1676509" id="1676509">CVE-2019-7577 SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676743" id="1676743">CVE-2019-7575 SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676749" id="1676749">CVE-2019-7574 SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676751" id="1676751">CVE-2019-7573 SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676753" id="1676753">CVE-2019-7572 SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676755" id="1676755">CVE-2019-7576 SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1676781" id="1676781">CVE-2019-7578 SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677143" id="1677143">CVE-2019-7638 SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677151" id="1677151">CVE-2019-7637 SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677156" id="1677156">CVE-2019-7636 SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1677158" id="1677158">CVE-2019-7635 SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="SDL is earlier than 0:1.2.15-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204627001"/>
              <criterion comment="SDL is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="SDL-devel is earlier than 0:1.2.15-38.el8" test_ref="oval:org.almalinux.alsa:tst:20204627003"/>
              <criterion comment="SDL-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204628" version="637">
      <metadata>
        <title>ALSA-2020:4628: libreoffice security, bug fix, and enhancement update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4628" ref_url="https://errata.almalinux.org/8/ALSA-2020-4628.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4628" ref_url="https://access.redhat.com/errata/RHSA-2020:4628" source="RHSA"/>
        <reference ref_id="CVE-2020-12802" ref_url="https://access.redhat.com/security/cve/CVE-2020-12802" source="CVE"/>
        <reference ref_id="CVE-2020-12803" ref_url="https://access.redhat.com/security/cve/CVE-2020-12803" source="CVE"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1). (BZ#1796893)

Security Fix(es):

* libreoffice: 'stealth mode' remote resource restrictions bypass (CVE-2020-12802)

* libreoffice: forms allowed to be submitted to any URI could result in local file overwrite (CVE-2020-12803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-12802" impact="low" public="20200608">CVE-2020-12802</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-12803" impact="low" public="20200608">CVE-2020-12803</cve>
          <bugzilla href="https://bugzilla.redhat.com/1848346" id="1848346">CVE-2020-12803 libreoffice: forms allowed to be submitted to any URI could result in local file overwrite</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1850226" id="1850226">CVE-2020-12802 libreoffice: 'stealth mode' remote resource restrictions bypass</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="liborcus is earlier than 0:0.14.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204628001"/>
              <criterion comment="liborcus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204628002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libcmis is earlier than 0:0.5.2-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204628003"/>
              <criterion comment="libcmis is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204628004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-af is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628005"/>
              <criterion comment="autocorr-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-bg is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628007"/>
              <criterion comment="autocorr-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ca is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628009"/>
              <criterion comment="autocorr-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-cs is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628011"/>
              <criterion comment="autocorr-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-da is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628013"/>
              <criterion comment="autocorr-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-de is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628015"/>
              <criterion comment="autocorr-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-en is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628017"/>
              <criterion comment="autocorr-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-es is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628019"/>
              <criterion comment="autocorr-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fa is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628021"/>
              <criterion comment="autocorr-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628023"/>
              <criterion comment="autocorr-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-fr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628025"/>
              <criterion comment="autocorr-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ga is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628027"/>
              <criterion comment="autocorr-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-hr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628029"/>
              <criterion comment="autocorr-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-hu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628031"/>
              <criterion comment="autocorr-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-is is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628033"/>
              <criterion comment="autocorr-is is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-it is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628035"/>
              <criterion comment="autocorr-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ja is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628037"/>
              <criterion comment="autocorr-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ko is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628039"/>
              <criterion comment="autocorr-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-lb is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628041"/>
              <criterion comment="autocorr-lb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-lt is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628043"/>
              <criterion comment="autocorr-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-mn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628045"/>
              <criterion comment="autocorr-mn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-nl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628047"/>
              <criterion comment="autocorr-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-pl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628049"/>
              <criterion comment="autocorr-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-pt is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628051"/>
              <criterion comment="autocorr-pt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ro is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628053"/>
              <criterion comment="autocorr-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-ru is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628055"/>
              <criterion comment="autocorr-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628057"/>
              <criterion comment="autocorr-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628059"/>
              <criterion comment="autocorr-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598056"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628061"/>
              <criterion comment="autocorr-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598058"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-sv is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628063"/>
              <criterion comment="autocorr-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-tr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628065"/>
              <criterion comment="autocorr-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-vi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628067"/>
              <criterion comment="autocorr-vi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="autocorr-zh is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628069"/>
              <criterion comment="autocorr-zh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598066"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-base is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628071"/>
              <criterion comment="libreoffice-base is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-calc is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628073"/>
              <criterion comment="libreoffice-calc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-core is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628075"/>
              <criterion comment="libreoffice-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-data is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628077"/>
              <criterion comment="libreoffice-data is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-draw is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628079"/>
              <criterion comment="libreoffice-draw is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-emailmerge is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628081"/>
              <criterion comment="libreoffice-emailmerge is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-filters is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628083"/>
              <criterion comment="libreoffice-filters is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-gdb-debug-support is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628085"/>
              <criterion comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-graphicfilter is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628087"/>
              <criterion comment="libreoffice-graphicfilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598084"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-gtk3 is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628089"/>
              <criterion comment="libreoffice-gtk3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598088"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ar is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628091"/>
              <criterion comment="libreoffice-help-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598090"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-bg is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628093"/>
              <criterion comment="libreoffice-help-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-bn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628095"/>
              <criterion comment="libreoffice-help-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598094"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ca is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628097"/>
              <criterion comment="libreoffice-help-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598096"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-cs is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628099"/>
              <criterion comment="libreoffice-help-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-da is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628101"/>
              <criterion comment="libreoffice-help-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598100"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-de is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628103"/>
              <criterion comment="libreoffice-help-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-dz is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628105"/>
              <criterion comment="libreoffice-help-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598104"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-el is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628107"/>
              <criterion comment="libreoffice-help-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-en is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628109"/>
              <criterion comment="libreoffice-help-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-es is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628111"/>
              <criterion comment="libreoffice-help-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-et is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628113"/>
              <criterion comment="libreoffice-help-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-eu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628115"/>
              <criterion comment="libreoffice-help-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598114"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-fi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628117"/>
              <criterion comment="libreoffice-help-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598116"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-fr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628119"/>
              <criterion comment="libreoffice-help-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598118"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-gl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628121"/>
              <criterion comment="libreoffice-help-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598120"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-gu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628123"/>
              <criterion comment="libreoffice-help-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-he is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628125"/>
              <criterion comment="libreoffice-help-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598124"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628127"/>
              <criterion comment="libreoffice-help-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598126"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628129"/>
              <criterion comment="libreoffice-help-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598128"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-hu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628131"/>
              <criterion comment="libreoffice-help-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598130"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-id is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628133"/>
              <criterion comment="libreoffice-help-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598132"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-it is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628135"/>
              <criterion comment="libreoffice-help-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598134"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ja is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628137"/>
              <criterion comment="libreoffice-help-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598136"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ko is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628139"/>
              <criterion comment="libreoffice-help-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-lt is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628141"/>
              <criterion comment="libreoffice-help-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-lv is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628143"/>
              <criterion comment="libreoffice-help-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nb is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628145"/>
              <criterion comment="libreoffice-help-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598144"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628147"/>
              <criterion comment="libreoffice-help-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598146"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-nn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628149"/>
              <criterion comment="libreoffice-help-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598148"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628151"/>
              <criterion comment="libreoffice-help-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598150"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pt-BR is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628153"/>
              <criterion comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598152"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-pt-PT is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628155"/>
              <criterion comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598154"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ro is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628157"/>
              <criterion comment="libreoffice-help-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598156"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ru is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628159"/>
              <criterion comment="libreoffice-help-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598158"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-si is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628161"/>
              <criterion comment="libreoffice-help-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598160"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628163"/>
              <criterion comment="libreoffice-help-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628165"/>
              <criterion comment="libreoffice-help-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598164"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-sv is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628167"/>
              <criterion comment="libreoffice-help-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598166"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-ta is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628169"/>
              <criterion comment="libreoffice-help-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598168"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-tr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628171"/>
              <criterion comment="libreoffice-help-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598170"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-uk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628173"/>
              <criterion comment="libreoffice-help-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598172"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-zh-Hans is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628175"/>
              <criterion comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598174"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-help-zh-Hant is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628177"/>
              <criterion comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-impress is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628179"/>
              <criterion comment="libreoffice-impress is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598178"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-af is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628181"/>
              <criterion comment="libreoffice-langpack-af is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598180"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ar is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628183"/>
              <criterion comment="libreoffice-langpack-ar is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-as is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628185"/>
              <criterion comment="libreoffice-langpack-as is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598184"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-bg is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628187"/>
              <criterion comment="libreoffice-langpack-bg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598186"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-bn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628189"/>
              <criterion comment="libreoffice-langpack-bn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598188"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-br is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628191"/>
              <criterion comment="libreoffice-langpack-br is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598190"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ca is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628193"/>
              <criterion comment="libreoffice-langpack-ca is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598192"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-cs is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628195"/>
              <criterion comment="libreoffice-langpack-cs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598194"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-cy is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628197"/>
              <criterion comment="libreoffice-langpack-cy is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598196"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-da is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628199"/>
              <criterion comment="libreoffice-langpack-da is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598198"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-de is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628201"/>
              <criterion comment="libreoffice-langpack-de is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598200"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-dz is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628203"/>
              <criterion comment="libreoffice-langpack-dz is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-el is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628205"/>
              <criterion comment="libreoffice-langpack-el is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598204"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-en is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628207"/>
              <criterion comment="libreoffice-langpack-en is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598206"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-es is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628209"/>
              <criterion comment="libreoffice-langpack-es is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598208"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-et is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628211"/>
              <criterion comment="libreoffice-langpack-et is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598210"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-eu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628213"/>
              <criterion comment="libreoffice-langpack-eu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598212"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fa is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628215"/>
              <criterion comment="libreoffice-langpack-fa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598214"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628217"/>
              <criterion comment="libreoffice-langpack-fi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598216"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-fr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628219"/>
              <criterion comment="libreoffice-langpack-fr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598218"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ga is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628221"/>
              <criterion comment="libreoffice-langpack-ga is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598220"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-gl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628223"/>
              <criterion comment="libreoffice-langpack-gl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-gu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628225"/>
              <criterion comment="libreoffice-langpack-gu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598224"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-he is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628227"/>
              <criterion comment="libreoffice-langpack-he is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598226"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hi is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628229"/>
              <criterion comment="libreoffice-langpack-hi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598228"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628231"/>
              <criterion comment="libreoffice-langpack-hr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598230"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-hu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628233"/>
              <criterion comment="libreoffice-langpack-hu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598232"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-id is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628235"/>
              <criterion comment="libreoffice-langpack-id is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598234"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-it is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628237"/>
              <criterion comment="libreoffice-langpack-it is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598236"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ja is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628239"/>
              <criterion comment="libreoffice-langpack-ja is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598238"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-kk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628241"/>
              <criterion comment="libreoffice-langpack-kk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598240"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-kn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628243"/>
              <criterion comment="libreoffice-langpack-kn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ko is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628245"/>
              <criterion comment="libreoffice-langpack-ko is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598244"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-lt is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628247"/>
              <criterion comment="libreoffice-langpack-lt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598246"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-lv is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628249"/>
              <criterion comment="libreoffice-langpack-lv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598248"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-mai is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628251"/>
              <criterion comment="libreoffice-langpack-mai is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598250"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ml is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628253"/>
              <criterion comment="libreoffice-langpack-ml is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598252"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-mr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628255"/>
              <criterion comment="libreoffice-langpack-mr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598254"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nb is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628257"/>
              <criterion comment="libreoffice-langpack-nb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598256"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628259"/>
              <criterion comment="libreoffice-langpack-nl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598258"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628261"/>
              <criterion comment="libreoffice-langpack-nn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598260"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628263"/>
              <criterion comment="libreoffice-langpack-nr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-nso is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628265"/>
              <criterion comment="libreoffice-langpack-nso is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598264"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-or is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628267"/>
              <criterion comment="libreoffice-langpack-or is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598266"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pa is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628269"/>
              <criterion comment="libreoffice-langpack-pa is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598268"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628271"/>
              <criterion comment="libreoffice-langpack-pl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598270"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pt-BR is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628273"/>
              <criterion comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598272"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-pt-PT is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628275"/>
              <criterion comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598274"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ro is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628277"/>
              <criterion comment="libreoffice-langpack-ro is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598276"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ru is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628279"/>
              <criterion comment="libreoffice-langpack-ru is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598278"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-si is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628281"/>
              <criterion comment="libreoffice-langpack-si is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598280"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628283"/>
              <criterion comment="libreoffice-langpack-sk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sl is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628285"/>
              <criterion comment="libreoffice-langpack-sl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598284"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628287"/>
              <criterion comment="libreoffice-langpack-sr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598286"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ss is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628289"/>
              <criterion comment="libreoffice-langpack-ss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598288"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-st is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628291"/>
              <criterion comment="libreoffice-langpack-st is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598290"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-sv is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628293"/>
              <criterion comment="libreoffice-langpack-sv is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598292"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ta is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628295"/>
              <criterion comment="libreoffice-langpack-ta is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598294"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-te is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628297"/>
              <criterion comment="libreoffice-langpack-te is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598296"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-th is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628299"/>
              <criterion comment="libreoffice-langpack-th is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598298"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-tn is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628301"/>
              <criterion comment="libreoffice-langpack-tn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598300"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-tr is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628303"/>
              <criterion comment="libreoffice-langpack-tr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ts is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628305"/>
              <criterion comment="libreoffice-langpack-ts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598304"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-uk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628307"/>
              <criterion comment="libreoffice-langpack-uk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598306"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-ve is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628309"/>
              <criterion comment="libreoffice-langpack-ve is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598308"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-xh is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628311"/>
              <criterion comment="libreoffice-langpack-xh is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598310"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zh-Hans is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628313"/>
              <criterion comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598312"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zh-Hant is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628315"/>
              <criterion comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598314"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-langpack-zu is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628317"/>
              <criterion comment="libreoffice-langpack-zu is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598316"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-math is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628319"/>
              <criterion comment="libreoffice-math is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598318"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ogltrans is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628321"/>
              <criterion comment="libreoffice-ogltrans is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598320"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-opensymbol-fonts is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628323"/>
              <criterion comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-pdfimport is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628325"/>
              <criterion comment="libreoffice-pdfimport is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598324"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-pyuno is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628327"/>
              <criterion comment="libreoffice-pyuno is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598326"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-sdk is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628329"/>
              <criterion comment="libreoffice-sdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598328"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-sdk-doc is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628331"/>
              <criterion comment="libreoffice-sdk-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598330"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ure is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628333"/>
              <criterion comment="libreoffice-ure is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598332"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-ure-common is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628335"/>
              <criterion comment="libreoffice-ure-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598334"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-wiki-publisher is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628337"/>
              <criterion comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598336"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-writer is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628339"/>
              <criterion comment="libreoffice-writer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598338"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-x11 is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628341"/>
              <criterion comment="libreoffice-x11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598340"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreoffice-xsltfilter is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628343"/>
              <criterion comment="libreoffice-xsltfilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598342"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libreofficekit is earlier than 1:6.3.6.2-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204628345"/>
              <criterion comment="libreofficekit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201598344"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204629" version="636">
      <metadata>
        <title>ALSA-2020:4629: libvpx security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4629" ref_url="https://errata.almalinux.org/8/ALSA-2020-4629.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4629" ref_url="https://access.redhat.com/errata/RHSA-2020:4629" source="RHSA"/>
        <reference ref_id="CVE-2019-2126" ref_url="https://access.redhat.com/security/cve/CVE-2019-2126" source="CVE"/>
        <reference ref_id="CVE-2019-9232" ref_url="https://access.redhat.com/security/cve/CVE-2019-9232" source="CVE"/>
        <reference ref_id="CVE-2019-9371" ref_url="https://access.redhat.com/security/cve/CVE-2019-9371" source="CVE"/>
        <reference ref_id="CVE-2019-9433" ref_url="https://access.redhat.com/security/cve/CVE-2019-9433" source="CVE"/>
        <description>The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.

Security Fix(es):

* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126)

* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)

* libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371)

* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-672" href="https://access.redhat.com/security/cve/CVE-2019-2126" impact="moderate" public="20191026">CVE-2019-2126</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2019-9232" impact="moderate" public="20191026">CVE-2019-9232</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-9371" impact="moderate" public="20191026">CVE-2019-9371</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-416-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-9433" impact="moderate" public="20191026">CVE-2019-9433</cve>
          <bugzilla href="https://bugzilla.redhat.com/1788966" id="1788966">CVE-2019-9232 libvpx: Out of bounds read in vp8_norm table</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1788994" id="1788994">CVE-2019-9433 libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789004" id="1789004">CVE-2019-9371 libvpx: Resource exhaustion after memory leak in mkvparser.cc</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1789008" id="1789008">CVE-2019-2126 libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libvpx is earlier than 0:1.7.0-8.el8" test_ref="oval:org.almalinux.alsa:tst:20204629001"/>
              <criterion comment="libvpx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204629002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libvpx-devel is earlier than 0:1.7.0-8.el8" test_ref="oval:org.almalinux.alsa:tst:20204629003"/>
              <criterion comment="libvpx-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204629004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204634" version="636">
      <metadata>
        <title>ALSA-2020:4634: libtiff security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4634" ref_url="https://errata.almalinux.org/8/ALSA-2020-4634.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4634" ref_url="https://access.redhat.com/errata/RHSA-2020:4634" source="RHSA"/>
        <reference ref_id="CVE-2019-17546" ref_url="https://access.redhat.com/security/cve/CVE-2019-17546" source="CVE"/>
        <description>The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

* libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c (CVE-2019-17546)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-17546" impact="moderate" public="20190815">CVE-2019-17546</cve>
          <bugzilla href="https://bugzilla.redhat.com/1765705" id="1765705">CVE-2019-17546 libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libtiff is earlier than 0:4.0.9-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204634001"/>
              <criterion comment="libtiff is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-devel is earlier than 0:4.0.9-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204634003"/>
              <criterion comment="libtiff-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libtiff-tools is earlier than 0:4.0.9-18.el8" test_ref="oval:org.almalinux.alsa:tst:20204634005"/>
              <criterion comment="libtiff-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193419006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204638" version="637">
      <metadata>
        <title>ALSA-2020:4638: sysstat security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4638" ref_url="https://errata.almalinux.org/8/ALSA-2020-4638.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4638" ref_url="https://access.redhat.com/errata/RHSA-2020:4638" source="RHSA"/>
        <reference ref_id="CVE-2019-16167" ref_url="https://access.redhat.com/security/cve/CVE-2019-16167" source="CVE"/>
        <description>The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity.

Security Fix(es):

* sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c (CVE-2019-16167)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2019-16167" impact="low" public="20190803">CVE-2019-16167</cve>
          <bugzilla href="https://bugzilla.redhat.com/1768970" id="1768970">CVE-2019-16167 sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="sysstat is earlier than 0:11.7.3-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204638001"/>
          <criterion comment="sysstat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204638002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204641" version="636">
      <metadata>
        <title>ALSA-2020:4641: python38:3.8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4641" ref_url="https://errata.almalinux.org/8/ALSA-2020-4641.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4641" ref_url="https://access.redhat.com/errata/RHSA-2020:4641" source="RHSA"/>
        <reference ref_id="CVE-2019-20477" ref_url="https://access.redhat.com/security/cve/CVE-2019-20477" source="CVE"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://access.redhat.com/security/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2020-14422" ref_url="https://access.redhat.com/security/cve/CVE-2020-14422" source="CVE"/>
        <reference ref_id="CVE-2020-1747" ref_url="https://access.redhat.com/security/cve/CVE-2020-1747" source="CVE"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://access.redhat.com/security/cve/CVE-2020-8492" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416)

Security Fix(es):

* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)

* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)

* PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747)

* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)

* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://access.redhat.com/security/cve/CVE-2019-20477" impact="moderate" public="20191118">CVE-2019-20477</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-20907" impact="moderate" public="20191210">CVE-2019-20907</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-14422" impact="moderate" public="20200618">CVE-2020-14422</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-1747" impact="moderate" public="20200302">CVE-2020-1747</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-8492" impact="moderate" public="20200302">CVE-2020-8492</cve>
          <bugzilla href="https://bugzilla.redhat.com/1806005" id="1806005">CVE-2019-20477 PyYAML: command execution through python/object/apply constructor in FullLoader</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1807367" id="1807367">CVE-2020-1747 PyYAML: arbitrary command execution through python/object/new when FullLoader is used</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809065" id="1809065">CVE-2020-8492 python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1854926" id="1854926">CVE-2020-14422 python: DoS via inefficiency in IPv{4,6}Interface classes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856481" id="1856481">CVE-2019-20907 python: infinite loop in the tarfile module via crafted TAR archive</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python38:3.8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20204641085"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="python38 is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410011"/>
              <criterion comment="python38 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38 is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410012"/>
              <criterion comment="python38 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-Cython is earlier than 0:0.29.14-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410031"/>
              <criterion comment="python38-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-Cython is earlier than 0:0.29.14-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410032"/>
              <criterion comment="python38-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-PyMySQL is earlier than 0:0.9.3-3.module_el8.2.0+6107+533dc13a" test_ref="oval:org.almalinux.alsa:tst:202046410051"/>
              <criterion comment="python38-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-PyMySQL is earlier than 0:0.9.3-3.module_el8.3.0+441+3b561464" test_ref="oval:org.almalinux.alsa:tst:202046410052"/>
              <criterion comment="python38-PyMySQL is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-asn1crypto is earlier than 0:1.2.0-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410071"/>
              <criterion comment="python38-asn1crypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-asn1crypto is earlier than 0:1.2.0-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410072"/>
              <criterion comment="python38-asn1crypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-babel is earlier than 0:2.7.0-10.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410091"/>
              <criterion comment="python38-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-babel is earlier than 0:2.7.0-10.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410092"/>
              <criterion comment="python38-babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410102"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-cffi is earlier than 0:1.13.2-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410111"/>
              <criterion comment="python38-cffi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-cffi is earlier than 0:1.13.2-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410112"/>
              <criterion comment="python38-cffi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-chardet is earlier than 0:3.0.4-19.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410131"/>
              <criterion comment="python38-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-chardet is earlier than 0:3.0.4-19.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410132"/>
              <criterion comment="python38-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-cryptography is earlier than 0:2.8-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410151"/>
              <criterion comment="python38-cryptography is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-cryptography is earlier than 0:2.8-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410152"/>
              <criterion comment="python38-cryptography is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-debug is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410171"/>
              <criterion comment="python38-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-debug is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410172"/>
              <criterion comment="python38-debug is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-devel is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410191"/>
              <criterion comment="python38-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-devel is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410192"/>
              <criterion comment="python38-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-idle is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410211"/>
              <criterion comment="python38-idle is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-idle is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410212"/>
              <criterion comment="python38-idle is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-idna is earlier than 0:2.8-6.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410231"/>
              <criterion comment="python38-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641024"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-idna is earlier than 0:2.8-6.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410232"/>
              <criterion comment="python38-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641024"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-jinja2 is earlier than 0:2.10.3-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410251"/>
              <criterion comment="python38-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-jinja2 is earlier than 0:2.10.3-4.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410252"/>
              <criterion comment="python38-jinja2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410262"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-libs is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410271"/>
              <criterion comment="python38-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-libs is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410272"/>
              <criterion comment="python38-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-lxml is earlier than 0:4.4.1-4.module_el8.2.0+6107+533dc13a" test_ref="oval:org.almalinux.alsa:tst:202046410291"/>
              <criterion comment="python38-lxml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-lxml is earlier than 0:4.4.1-4.module_el8.3.0+441+3b561464" test_ref="oval:org.almalinux.alsa:tst:202046410292"/>
              <criterion comment="python38-lxml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-markupsafe is earlier than 0:1.1.1-6.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410311"/>
              <criterion comment="python38-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-markupsafe is earlier than 0:1.1.1-6.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410312"/>
              <criterion comment="python38-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-mod_wsgi is earlier than 0:4.6.8-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410331"/>
              <criterion comment="python38-mod_wsgi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-mod_wsgi is earlier than 0:4.6.8-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410332"/>
              <criterion comment="python38-mod_wsgi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy is earlier than 0:1.17.3-5.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410351"/>
              <criterion comment="python38-numpy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy is earlier than 0:1.17.3-5.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410352"/>
              <criterion comment="python38-numpy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy-doc is earlier than 0:1.17.3-5.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410371"/>
              <criterion comment="python38-numpy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641038"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy-doc is earlier than 0:1.17.3-5.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410372"/>
              <criterion comment="python38-numpy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410382"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy-f2py is earlier than 0:1.17.3-5.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410391"/>
              <criterion comment="python38-numpy-f2py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-numpy-f2py is earlier than 0:1.17.3-5.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410392"/>
              <criterion comment="python38-numpy-f2py is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410402"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pip is earlier than 0:19.3.1-1.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410411"/>
              <criterion comment="python38-pip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pip is earlier than 0:19.3.1-1.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410412"/>
              <criterion comment="python38-pip is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410422"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pip-wheel is earlier than 0:19.3.1-1.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410431"/>
              <criterion comment="python38-pip-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pip-wheel is earlier than 0:19.3.1-1.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410432"/>
              <criterion comment="python38-pip-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410442"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-ply is earlier than 0:3.11-8.module_el8.2.0+6107+533dc13a" test_ref="oval:org.almalinux.alsa:tst:202046410451"/>
              <criterion comment="python38-ply is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641046"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-ply is earlier than 0:3.11-8.module_el8.3.0+441+3b561464" test_ref="oval:org.almalinux.alsa:tst:202046410452"/>
              <criterion comment="python38-ply is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410462"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psutil is earlier than 0:5.6.4-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410471"/>
              <criterion comment="python38-psutil is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psutil is earlier than 0:5.6.4-3.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410472"/>
              <criterion comment="python38-psutil is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410482"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2 is earlier than 0:2.8.4-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410491"/>
              <criterion comment="python38-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2 is earlier than 0:2.8.4-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410492"/>
              <criterion comment="python38-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2-doc is earlier than 0:2.8.4-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410511"/>
              <criterion comment="python38-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2-doc is earlier than 0:2.8.4-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410512"/>
              <criterion comment="python38-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2-tests is earlier than 0:2.8.4-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410531"/>
              <criterion comment="python38-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-psycopg2-tests is earlier than 0:2.8.4-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410532"/>
              <criterion comment="python38-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pycparser is earlier than 0:2.19-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410551"/>
              <criterion comment="python38-pycparser is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pycparser is earlier than 0:2.19-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410552"/>
              <criterion comment="python38-pycparser is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pysocks is earlier than 0:1.7.1-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410571"/>
              <criterion comment="python38-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641058"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pysocks is earlier than 0:1.7.1-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410572"/>
              <criterion comment="python38-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641058"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pytz is earlier than 0:2019.3-3.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410591"/>
              <criterion comment="python38-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641060"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pytz is earlier than 0:2019.3-3.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410592"/>
              <criterion comment="python38-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641060"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pyyaml is earlier than 0:5.3.1-1.module_el8.4.0+2181+8e86ab84" test_ref="oval:org.almalinux.alsa:tst:202046410611"/>
              <criterion comment="python38-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pyyaml is earlier than 0:5.3.1-1.module_el8.4.0+2302+8e86ab84" test_ref="oval:org.almalinux.alsa:tst:202046410612"/>
              <criterion comment="python38-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-pyyaml is earlier than 0:5.3.1-1.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410613"/>
              <criterion comment="python38-pyyaml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410622"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-requests is earlier than 0:2.22.0-9.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410631"/>
              <criterion comment="python38-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641064"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-requests is earlier than 0:2.22.0-9.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410632"/>
              <criterion comment="python38-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641064"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-rpm-macros is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410651"/>
              <criterion comment="python38-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641066"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-rpm-macros is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410652"/>
              <criterion comment="python38-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410662"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-scipy is earlier than 0:1.3.1-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410671"/>
              <criterion comment="python38-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-scipy is earlier than 0:1.3.1-4.module_el8.5.0+144+f242e3d3" test_ref="oval:org.almalinux.alsa:tst:202046410672"/>
              <criterion comment="python38-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641068"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-setuptools is earlier than 0:41.6.0-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410691"/>
              <criterion comment="python38-setuptools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641070"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-setuptools is earlier than 0:41.6.0-4.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410692"/>
              <criterion comment="python38-setuptools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410702"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-setuptools-wheel is earlier than 0:41.6.0-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410711"/>
              <criterion comment="python38-setuptools-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641072"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-setuptools-wheel is earlier than 0:41.6.0-4.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410712"/>
              <criterion comment="python38-setuptools-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410722"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-six is earlier than 0:1.12.0-9.module_el8.2.0+6107+533dc13a" test_ref="oval:org.almalinux.alsa:tst:202046410731"/>
              <criterion comment="python38-six is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641074"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-six is earlier than 0:1.12.0-9.module_el8.3.0+441+3b561464" test_ref="oval:org.almalinux.alsa:tst:202046410732"/>
              <criterion comment="python38-six is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410742"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-test is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410751"/>
              <criterion comment="python38-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641076"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-test is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410752"/>
              <criterion comment="python38-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410762"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-tkinter is earlier than 0:3.8.3-3.module_el8.3.0+2106+79e7e61a" test_ref="oval:org.almalinux.alsa:tst:202046410771"/>
              <criterion comment="python38-tkinter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641078"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-tkinter is earlier than 0:3.8.3-3.module_el8.3.0+468+0c52a667" test_ref="oval:org.almalinux.alsa:tst:202046410772"/>
              <criterion comment="python38-tkinter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410782"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-urllib3 is earlier than 0:1.25.7-4.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410791"/>
              <criterion comment="python38-urllib3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641080"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-urllib3 is earlier than 0:1.25.7-4.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410792"/>
              <criterion comment="python38-urllib3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410802"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-wheel is earlier than 0:0.33.6-5.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410811"/>
              <criterion comment="python38-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641082"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-wheel is earlier than 0:0.33.6-5.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410812"/>
              <criterion comment="python38-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410822"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-wheel-wheel is earlier than 0:0.33.6-5.module_el8.4.0+2511+e19d35e4" test_ref="oval:org.almalinux.alsa:tst:202046410831"/>
              <criterion comment="python38-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204641084"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python38-wheel-wheel is earlier than 0:0.33.6-5.module_el8.4.0+647+0ba99ce8" test_ref="oval:org.almalinux.alsa:tst:202046410832"/>
              <criterion comment="python38-wheel-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046410842"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204643" version="635">
      <metadata>
        <title>ALSA-2020:4643: poppler security update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4643" ref_url="https://errata.almalinux.org/8/ALSA-2020-4643.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4643" ref_url="https://access.redhat.com/errata/RHSA-2020:4643" source="RHSA"/>
        <reference ref_id="CVE-2019-14494" ref_url="https://access.redhat.com/security/cve/CVE-2019-14494" source="CVE"/>
        <description>Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.

Security Fix(es):

* poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2019-14494" impact="low" public="20190711">CVE-2019-14494</cve>
          <bugzilla href="https://bugzilla.redhat.com/1797453" id="1797453">CVE-2019-14494 poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="poppler is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643001"/>
              <criterion comment="poppler is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-cpp is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643003"/>
              <criterion comment="poppler-cpp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-cpp-devel is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643005"/>
              <criterion comment="poppler-cpp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-devel is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643007"/>
              <criterion comment="poppler-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-glib is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643009"/>
              <criterion comment="poppler-glib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-glib-devel is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643011"/>
              <criterion comment="poppler-glib-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-qt5 is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643013"/>
              <criterion comment="poppler-qt5 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-qt5-devel is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643015"/>
              <criterion comment="poppler-qt5-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="poppler-utils is earlier than 0:0.66.0-27.el8" test_ref="oval:org.almalinux.alsa:tst:20204643017"/>
              <criterion comment="poppler-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192713018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204647" version="640">
      <metadata>
        <title>ALSA-2020:4647: freerdp and vinagre security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4647" ref_url="https://errata.almalinux.org/8/ALSA-2020-4647.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4647" ref_url="https://access.redhat.com/errata/RHSA-2020:4647" source="RHSA"/>
        <reference ref_id="CVE-2020-11018" ref_url="https://access.redhat.com/security/cve/CVE-2020-11018" source="CVE"/>
        <reference ref_id="CVE-2020-11019" ref_url="https://access.redhat.com/security/cve/CVE-2020-11019" source="CVE"/>
        <reference ref_id="CVE-2020-11038" ref_url="https://access.redhat.com/security/cve/CVE-2020-11038" source="CVE"/>
        <reference ref_id="CVE-2020-11039" ref_url="https://access.redhat.com/security/cve/CVE-2020-11039" source="CVE"/>
        <reference ref_id="CVE-2020-11040" ref_url="https://access.redhat.com/security/cve/CVE-2020-11040" source="CVE"/>
        <reference ref_id="CVE-2020-11041" ref_url="https://access.redhat.com/security/cve/CVE-2020-11041" source="CVE"/>
        <reference ref_id="CVE-2020-11042" ref_url="https://access.redhat.com/security/cve/CVE-2020-11042" source="CVE"/>
        <reference ref_id="CVE-2020-11043" ref_url="https://access.redhat.com/security/cve/CVE-2020-11043" source="CVE"/>
        <reference ref_id="CVE-2020-11044" ref_url="https://access.redhat.com/security/cve/CVE-2020-11044" source="CVE"/>
        <reference ref_id="CVE-2020-11045" ref_url="https://access.redhat.com/security/cve/CVE-2020-11045" source="CVE"/>
        <reference ref_id="CVE-2020-11046" ref_url="https://access.redhat.com/security/cve/CVE-2020-11046" source="CVE"/>
        <reference ref_id="CVE-2020-11047" ref_url="https://access.redhat.com/security/cve/CVE-2020-11047" source="CVE"/>
        <reference ref_id="CVE-2020-11048" ref_url="https://access.redhat.com/security/cve/CVE-2020-11048" source="CVE"/>
        <reference ref_id="CVE-2020-11049" ref_url="https://access.redhat.com/security/cve/CVE-2020-11049" source="CVE"/>
        <reference ref_id="CVE-2020-11058" ref_url="https://access.redhat.com/security/cve/CVE-2020-11058" source="CVE"/>
        <reference ref_id="CVE-2020-11085" ref_url="https://access.redhat.com/security/cve/CVE-2020-11085" source="CVE"/>
        <reference ref_id="CVE-2020-11086" ref_url="https://access.redhat.com/security/cve/CVE-2020-11086" source="CVE"/>
        <reference ref_id="CVE-2020-11087" ref_url="https://access.redhat.com/security/cve/CVE-2020-11087" source="CVE"/>
        <reference ref_id="CVE-2020-11088" ref_url="https://access.redhat.com/security/cve/CVE-2020-11088" source="CVE"/>
        <reference ref_id="CVE-2020-11089" ref_url="https://access.redhat.com/security/cve/CVE-2020-11089" source="CVE"/>
        <reference ref_id="CVE-2020-11522" ref_url="https://access.redhat.com/security/cve/CVE-2020-11522" source="CVE"/>
        <reference ref_id="CVE-2020-11525" ref_url="https://access.redhat.com/security/cve/CVE-2020-11525" source="CVE"/>
        <reference ref_id="CVE-2020-11526" ref_url="https://access.redhat.com/security/cve/CVE-2020-11526" source="CVE"/>
        <reference ref_id="CVE-2020-13396" ref_url="https://access.redhat.com/security/cve/CVE-2020-13396" source="CVE"/>
        <reference ref_id="CVE-2020-13397" ref_url="https://access.redhat.com/security/cve/CVE-2020-13397" source="CVE"/>
        <description>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.

The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)

Security Fix(es):

* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)

* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)

* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)

* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)

* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)

* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)

* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)

* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)

* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)

* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)

* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)

* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)

* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)

* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)

* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)

* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)

* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)

* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)

* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)

* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)

* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)

* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)

* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)

* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)

* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11018" impact="low" public="20200409">CVE-2020-11018</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11019" impact="low" public="20200409">CVE-2020-11019</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-11038" impact="low" public="20200409">CVE-2020-11038</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L" cwe="CWE-20-&gt;CWE-190-&gt;CWE-770-&gt;(CWE-125|CWE-787)" href="https://access.redhat.com/security/cve/CVE-2020-11039" impact="moderate" public="20200409">CVE-2020-11039</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11040" impact="low" public="20200409">CVE-2020-11040</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-129-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11041" impact="low" public="20200409">CVE-2020-11041</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11042" impact="moderate" public="20200331">CVE-2020-11042</cve>
          <cve cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-20-&gt;CWE-805-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11043" impact="low" public="20200409">CVE-2020-11043</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-672" href="https://access.redhat.com/security/cve/CVE-2020-11044" impact="low" public="20200331">CVE-2020-11044</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11045" impact="low" public="20200330">CVE-2020-11045</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-119-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11046" impact="low" public="20200330">CVE-2020-11046</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11047" impact="moderate" public="20200409">CVE-2020-11047</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11048" impact="low" public="20200409">CVE-2020-11048</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11049" impact="low" public="20200409">CVE-2020-11049</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-119-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11058" impact="low" public="20200409">CVE-2020-11058</cve>
          <cve cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-805-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11085" impact="low" public="20200529">CVE-2020-11085</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11086" impact="low" public="20200529">CVE-2020-11086</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-20-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11087" impact="low" public="20200529">CVE-2020-11087</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11088" impact="low" public="20200529">CVE-2020-11088</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11089" impact="low" public="20200529">CVE-2020-11089</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11522" impact="low" public="20200409">CVE-2020-11522</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11525" impact="low" public="20200409">CVE-2020-11525</cve>
          <cve cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-11526" impact="low" public="20200409">CVE-2020-11526</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-13396" impact="moderate" public="20200522">CVE-2020-13396</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-13397" impact="moderate" public="20200522">CVE-2020-13397</cve>
          <bugzilla href="https://bugzilla.redhat.com/1835382" id="1835382">CVE-2020-11042 freerdp: out-of-bounds read in update_read_icon_info function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835391" id="1835391">CVE-2020-11044 freerdp: double free in update_read_cache_bitmap_v3_order function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835399" id="1835399">CVE-2020-11045 freerdp: out of bounds read in update_read_bitmap_data function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835403" id="1835403">CVE-2020-11046 freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835762" id="1835762">CVE-2020-11047 freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835766" id="1835766">CVE-2020-11048 freerdp: out-of-bounds read could result in aborting the session</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835772" id="1835772">CVE-2020-11049 freerdp: out-of-bound read of client memory that is then passed on to the protocol parser</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835779" id="1835779">CVE-2020-11058 freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836223" id="1836223">CVE-2020-11522 freerdp: out-of-bounds read in gdi.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836239" id="1836239">CVE-2020-11525 freerdp: out-of-bounds read in bitmap.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1836247" id="1836247">CVE-2020-11526 freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1841189" id="1841189">CVE-2020-13396 freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1841196" id="1841196">CVE-2020-13397 freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844161" id="1844161">CVE-2020-11085 freerdp: out-of-bounds read in cliprdr_read_format_list function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844166" id="1844166">CVE-2020-11086 freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844171" id="1844171">CVE-2020-11087 freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844177" id="1844177">CVE-2020-11088 freerdp: out-of-bounds read in ntlm_read_NegotiateMessage</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1844184" id="1844184">CVE-2020-11089 freerdp: out-of-bounds read in irp functions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848008" id="1848008">CVE-2020-11018 freerdp: Out of bound read in cliprdr_server_receive_capabilities</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848012" id="1848012">CVE-2020-11019 freerdp: Out of bound read in update_recv could result in a crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848018" id="1848018">CVE-2020-11038 freerdp: Integer overflow in VIDEO channel</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848022" id="1848022">CVE-2020-11039 freerdp: Out of bound read/write in usb redirection channel</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848029" id="1848029">CVE-2020-11040 freerdp: Out of bound access in clear_decompress_subcode_rlex</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848034" id="1848034">CVE-2020-11041 freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848038" id="1848038">CVE-2020-11043 freerdp: out of bound read in rfx_process_message_tileset</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freerdp is earlier than 2:2.1.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204647001"/>
              <criterion comment="freerdp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-devel is earlier than 2:2.1.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204647003"/>
              <criterion comment="freerdp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freerdp-libs is earlier than 2:2.1.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204647005"/>
              <criterion comment="freerdp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr is earlier than 2:2.1.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204647007"/>
              <criterion comment="libwinpr is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwinpr-devel is earlier than 2:2.1.1-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204647009"/>
              <criterion comment="libwinpr-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202336010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="vinagre is earlier than 0:3.22.0-23.el8" test_ref="oval:org.almalinux.alsa:tst:20204647011"/>
              <criterion comment="vinagre is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201766090"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204649" version="636">
      <metadata>
        <title>ALSA-2020:4649: evolution security and bug fix update (Low)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4649" ref_url="https://errata.almalinux.org/8/ALSA-2020-4649.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4649" ref_url="https://access.redhat.com/errata/RHSA-2020:4649" source="RHSA"/>
        <reference ref_id="CVE-2020-14928" ref_url="https://access.redhat.com/security/cve/CVE-2020-14928" source="CVE"/>
        <description>Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.

The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.

OpenChange provides libraries to access Microsoft Exchange servers using native protocols.

Security Fix(es):

* evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14928" impact="low" public="20200704">CVE-2020-14928</cve>
          <bugzilla href="https://bugzilla.redhat.com/1857470" id="1857470">CVE-2020-14928 evolution-data-server: Response injection via STARTTLS in SMTP and POP3</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bogofilter is earlier than 0:1.2.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204649001"/>
              <criterion comment="bogofilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204649002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openchange is earlier than 0:2.3-26.el8" test_ref="oval:org.almalinux.alsa:tst:20204649003"/>
              <criterion comment="openchange is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201878002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-mapi is earlier than 0:3.28.3-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204649005"/>
              <criterion comment="evolution-mapi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204649006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-mapi-langpacks is earlier than 0:3.28.3-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204649007"/>
              <criterion comment="evolution-mapi-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204649008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649009"/>
              <criterion comment="evolution is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-bogofilter is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649011"/>
              <criterion comment="evolution-bogofilter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-devel is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649013"/>
              <criterion comment="evolution-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-help is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649015"/>
              <criterion comment="evolution-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-langpacks is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649017"/>
              <criterion comment="evolution-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-pst is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649019"/>
              <criterion comment="evolution-pst is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-spamassassin is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649021"/>
              <criterion comment="evolution-spamassassin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649023"/>
              <criterion comment="evolution-data-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-devel is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649025"/>
              <criterion comment="evolution-data-server-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-doc is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649027"/>
              <criterion comment="evolution-data-server-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-langpacks is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649029"/>
              <criterion comment="evolution-data-server-langpacks is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-perl is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649031"/>
              <criterion comment="evolution-data-server-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="evolution-data-server-tests is earlier than 0:3.28.5-14.el8" test_ref="oval:org.almalinux.alsa:tst:20204649033"/>
              <criterion comment="evolution-data-server-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193699016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204650" version="636">
      <metadata>
        <title>ALSA-2020:4650: cloud-init security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4650" ref_url="https://errata.almalinux.org/8/ALSA-2020-4650.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4650" ref_url="https://access.redhat.com/errata/RHSA-2020:4650" source="RHSA"/>
        <reference ref_id="CVE-2020-8631" ref_url="https://access.redhat.com/security/cve/CVE-2020-8631" source="CVE"/>
        <reference ref_id="CVE-2020-8632" ref_url="https://access.redhat.com/security/cve/CVE-2020-8632" source="CVE"/>
        <description>The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.

Security Fix(es):

* cloud-init: Use of random.choice when generating random password (CVE-2020-8631)

* cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py (CVE-2020-8632)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-330" href="https://access.redhat.com/security/cve/CVE-2020-8631" impact="moderate" public="20200205">CVE-2020-8631</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-330" href="https://access.redhat.com/security/cve/CVE-2020-8632" impact="moderate" public="20200205">CVE-2020-8632</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798728" id="1798728">CVE-2020-8632 cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798731" id="1798731">CVE-2020-8631 cloud-init: Use of random.choice when generating random password</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="cloud-init is earlier than 0:19.4-11.el8" test_ref="oval:org.almalinux.alsa:tst:20204650001"/>
          <criterion comment="cloud-init is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20191992002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204654" version="636">
      <metadata>
        <title>ALSA-2020:4654: python27:2.7 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4654" ref_url="https://errata.almalinux.org/8/ALSA-2020-4654.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4654" ref_url="https://access.redhat.com/errata/RHSA-2020:4654" source="RHSA"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://access.redhat.com/security/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2019-20916" ref_url="https://access.redhat.com/security/cve/CVE-2019-20916" source="CVE"/>
        <description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.

Security Fix(es):

* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)

* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-20907" impact="moderate" public="20191210">CVE-2019-20907</cve>
          <cve cvss3="8.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-20916" impact="moderate" public="20190416">CVE-2019-20916</cve>
          <bugzilla href="https://bugzilla.redhat.com/1856481" id="1856481">CVE-2019-20907 python: infinite loop in the tarfile module via crafted TAR archive</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1868135" id="1868135">CVE-2019-20916 python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module python27:2.7 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190981119"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350011"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350012"/>
              <criterion comment="babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981002"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350013"/>
              <criterion comment="babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810022"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350031"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350032"/>
              <criterion comment="python-nose-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-nose-docs is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350033"/>
              <criterion comment="python-nose-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350051"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350052"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-psycopg2-doc is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350053"/>
              <criterion comment="python-psycopg2-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202046540071"/>
              <criterion comment="python-sqlalchemy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-sqlalchemy-doc is earlier than 0:1.3.2-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202046540072"/>
              <criterion comment="python-sqlalchemy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2 is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046540091"/>
              <criterion comment="python2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2 is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046540092"/>
              <criterion comment="python2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350111"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-Cython is earlier than 0:0.28.1-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350112"/>
              <criterion comment="python2-Cython is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350131"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-PyMySQL is earlier than 0:0.8.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350132"/>
              <criterion comment="python2-PyMySQL is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981014"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350151"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-attrs is earlier than 0:17.4.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350152"/>
              <criterion comment="python2-attrs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981016"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350171"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350172"/>
              <criterion comment="python2-babel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-babel is earlier than 0:2.5.1-9.module_el8.4.0+725+f7a1a6fe" test_ref="oval:org.almalinux.alsa:tst:201933350173"/>
              <criterion comment="python2-babel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350191"/>
              <criterion comment="python2-backports is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports is earlier than 0:1.0-15.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350192"/>
              <criterion comment="python2-backports is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350211"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-backports-ssl_match_hostname is earlier than 0:3.5.0.1-11.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350212"/>
              <criterion comment="python2-backports-ssl_match_hostname is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350231"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350232"/>
              <criterion comment="python2-bson is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-bson is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350233"/>
              <criterion comment="python2-bson is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350251"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-chardet is earlier than 0:3.0.4-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350252"/>
              <criterion comment="python2-chardet is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981026"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350271"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-coverage is earlier than 0:4.5.1-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350272"/>
              <criterion comment="python2-coverage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-debug is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046540291"/>
              <criterion comment="python2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-debug is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046540292"/>
              <criterion comment="python2-debug is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810302"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-devel is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046540311"/>
              <criterion comment="python2-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-devel is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046540312"/>
              <criterion comment="python2-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350331"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-dns is earlier than 0:1.15.0-10.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350332"/>
              <criterion comment="python2-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981034"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350351"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350352"/>
              <criterion comment="python2-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981036"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350371"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docs-info is earlier than 0:2.7.16-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350372"/>
              <criterion comment="python2-docs-info is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981038"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350391"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-docutils is earlier than 0:0.14-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350392"/>
              <criterion comment="python2-docutils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350411"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-funcsigs is earlier than 0:1.0.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350412"/>
              <criterion comment="python2-funcsigs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981042"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350431"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-idna is earlier than 0:2.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350432"/>
              <criterion comment="python2-idna is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981044"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350451"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-ipaddress is earlier than 0:1.0.18-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350452"/>
              <criterion comment="python2-ipaddress is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981046"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350471"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350472"/>
              <criterion comment="python2-jinja2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981048"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-jinja2 is earlier than 0:2.10-8.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350473"/>
              <criterion comment="python2-jinja2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810482"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-libs is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046540491"/>
              <criterion comment="python2-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-libs is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046540492"/>
              <criterion comment="python2-libs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810502"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350511"/>
              <criterion comment="python2-lxml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981052"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-lxml is earlier than 0:4.2.3-3.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350512"/>
              <criterion comment="python2-lxml is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810522"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350531"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-markupsafe is earlier than 0:0.23-19.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350532"/>
              <criterion comment="python2-markupsafe is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981054"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350551"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-mock is earlier than 0:2.0.0-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350552"/>
              <criterion comment="python2-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981056"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350571"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350572"/>
              <criterion comment="python2-nose is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981058"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-nose is earlier than 0:1.3.7-30.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350573"/>
              <criterion comment="python2-nose is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810582"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350591"/>
              <criterion comment="python2-numpy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981060"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350592"/>
              <criterion comment="python2-numpy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810602"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350611"/>
              <criterion comment="python2-numpy-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981062"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-doc is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350612"/>
              <criterion comment="python2-numpy-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810622"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350631"/>
              <criterion comment="python2-numpy-f2py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981064"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-numpy-f2py is earlier than 1:1.14.2-13.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933350632"/>
              <criterion comment="python2-numpy-f2py is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810642"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip is earlier than 0:9.0.3-18.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202046540651"/>
              <criterion comment="python2-pip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981066"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip is earlier than 0:9.0.3-18.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202046540652"/>
              <criterion comment="python2-pip is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981066"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip-wheel is earlier than 0:9.0.3-18.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202046540671"/>
              <criterion comment="python2-pip-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335068"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pip-wheel is earlier than 0:9.0.3-18.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202046540672"/>
              <criterion comment="python2-pip-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335068"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350691"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pluggy is earlier than 0:0.6.0-8.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350692"/>
              <criterion comment="python2-pluggy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981068"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350711"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350712"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2 is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350713"/>
              <criterion comment="python2-psycopg2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981070"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350731"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350732"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-debug is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350733"/>
              <criterion comment="python2-psycopg2-debug is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981072"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350751"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350752"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-psycopg2-tests is earlier than 0:2.7.5-7.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350753"/>
              <criterion comment="python2-psycopg2-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981074"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350771"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-py is earlier than 0:1.5.3-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350772"/>
              <criterion comment="python2-py is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981076"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350791"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350792"/>
              <criterion comment="python2-pygments is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981078"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pygments is earlier than 0:2.2.0-20.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350793"/>
              <criterion comment="python2-pygments is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810782"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350811"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350812"/>
              <criterion comment="python2-pymongo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981080"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350813"/>
              <criterion comment="python2-pymongo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810802"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350831"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350832"/>
              <criterion comment="python2-pymongo-gridfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pymongo-gridfs is earlier than 0:3.6.1-11.module_el8.4.0+794+8dd291b0" test_ref="oval:org.almalinux.alsa:tst:201933350833"/>
              <criterion comment="python2-pymongo-gridfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810822"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350851"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pysocks is earlier than 0:1.6.8-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350852"/>
              <criterion comment="python2-pysocks is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981084"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350871"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest is earlier than 0:3.4.2-13.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350872"/>
              <criterion comment="python2-pytest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981086"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350891"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytest-mock is earlier than 0:1.9.0-4.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350892"/>
              <criterion comment="python2-pytest-mock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981088"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350911"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pytz is earlier than 0:2017.2-12.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350912"/>
              <criterion comment="python2-pytz is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981090"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350931"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-pyyaml is earlier than 0:3.12-16.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350932"/>
              <criterion comment="python2-pyyaml is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981092"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-3.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202016050951"/>
              <criterion comment="python2-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981094"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-requests is earlier than 0:2.20.0-3.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202016050952"/>
              <criterion comment="python2-requests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981094"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933350971"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-rpm-macros is earlier than 0:3-38.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933350972"/>
              <criterion comment="python2-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981096"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933350991"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933350992"/>
              <criterion comment="python2-scipy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981098"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-scipy is earlier than 0:1.0.0-20.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933350993"/>
              <criterion comment="python2-scipy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909810982"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools is earlier than 0:39.0.1-12.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:202046541011"/>
              <criterion comment="python2-setuptools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981100"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools is earlier than 0:39.0.1-12.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046541012"/>
              <criterion comment="python2-setuptools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811002"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools-wheel is earlier than 0:39.0.1-12.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:202046541031"/>
              <criterion comment="python2-setuptools-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335104"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools-wheel is earlier than 0:39.0.1-12.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046541032"/>
              <criterion comment="python2-setuptools-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:201933351051"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-setuptools_scm is earlier than 0:1.15.7-6.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:201933351052"/>
              <criterion comment="python2-setuptools_scm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981102"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351071"/>
              <criterion comment="python2-six is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981104"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-six is earlier than 0:1.11.0-5.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351072"/>
              <criterion comment="python2-six is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-sqlalchemy is earlier than 0:1.3.2-2.module_el8.5.0+2579+77770ab7" test_ref="oval:org.almalinux.alsa:tst:202046541091"/>
              <criterion comment="python2-sqlalchemy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-sqlalchemy is earlier than 0:1.3.2-2.module_el8.5.0+124+0838c6dc" test_ref="oval:org.almalinux.alsa:tst:202046541092"/>
              <criterion comment="python2-sqlalchemy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981106"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-test is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046541111"/>
              <criterion comment="python2-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981108"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-test is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046541112"/>
              <criterion comment="python2-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tkinter is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046541131"/>
              <criterion comment="python2-tkinter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981110"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tkinter is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046541132"/>
              <criterion comment="python2-tkinter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tools is earlier than 0:2.7.17-2.module_el8.3.0+2062+eb4bba01.alma" test_ref="oval:org.almalinux.alsa:tst:202046541151"/>
              <criterion comment="python2-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981112"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-tools is earlier than 0:2.7.17-2.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:202046541152"/>
              <criterion comment="python2-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351171"/>
              <criterion comment="python2-urllib3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981114"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-urllib3 is earlier than 0:1.24.2-1.module_el8.3.0+478+7570e00c" test_ref="oval:org.almalinux.alsa:tst:201933351172"/>
              <criterion comment="python2-urllib3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351191"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351192"/>
              <criterion comment="python2-virtualenv is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981116"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-virtualenv is earlier than 0:15.1.0-19.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351193"/>
              <criterion comment="python2-virtualenv is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811162"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351211"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351212"/>
              <criterion comment="python2-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190981118"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351213"/>
              <criterion comment="python2-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909811182"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.3.0+2005+eb4bba01" test_ref="oval:org.almalinux.alsa:tst:201933351231"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+2283+0b56c8de" test_ref="oval:org.almalinux.alsa:tst:201933351232"/>
              <criterion comment="python2-wheel-wheel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193335124"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python2-wheel-wheel is earlier than 1:0.31.1-2.module_el8.4.0+642+1dc4fb01" test_ref="oval:org.almalinux.alsa:tst:201933351233"/>
              <criterion comment="python2-wheel-wheel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933351242"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204655" version="636">
      <metadata>
        <title>ALSA-2020:4655: cyrus-imapd security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4655" ref_url="https://errata.almalinux.org/8/ALSA-2020-4655.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4655" ref_url="https://access.redhat.com/errata/RHSA-2020:4655" source="RHSA"/>
        <reference ref_id="CVE-2019-18928" ref_url="https://access.redhat.com/security/cve/CVE-2019-18928" source="CVE"/>
        <reference ref_id="CVE-2019-19783" ref_url="https://access.redhat.com/security/cve/CVE-2019-19783" source="CVE"/>
        <description>The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.

Security Fix(es):

* cyrus-imapd: privilege escalation in HTTP request (CVE-2019-18928)

* cyrus-imapd: lmtpd component created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks (CVE-2019-19783)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2019-18928" impact="moderate" public="20191114">CVE-2019-18928</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-287" href="https://access.redhat.com/security/cve/CVE-2019-19783" impact="moderate" public="20191219">CVE-2019-19783</cve>
          <bugzilla href="https://bugzilla.redhat.com/1775177" id="1775177">CVE-2019-18928 cyrus-imapd: privilege escalation in HTTP request</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1786756" id="1786756">CVE-2019-19783 cyrus-imapd: lmtpd component created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="cyrus-imapd is earlier than 0:3.0.7-19.el8" test_ref="oval:org.almalinux.alsa:tst:20204655001"/>
              <criterion comment="cyrus-imapd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-imapd-utils is earlier than 0:3.0.7-19.el8" test_ref="oval:org.almalinux.alsa:tst:20204655003"/>
              <criterion comment="cyrus-imapd-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cyrus-imapd-vzic is earlier than 0:3.0.7-19.el8" test_ref="oval:org.almalinux.alsa:tst:20204655005"/>
              <criterion comment="cyrus-imapd-vzic is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191771006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204659" version="635">
      <metadata>
        <title>ALSA-2020:4659: gd security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4659" ref_url="https://errata.almalinux.org/8/ALSA-2020-4659.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4659" ref_url="https://access.redhat.com/errata/RHSA-2020:4659" source="RHSA"/>
        <reference ref_id="CVE-2018-14553" ref_url="https://access.redhat.com/security/cve/CVE-2018-14553" source="CVE"/>
        <reference ref_id="CVE-2019-6977" ref_url="https://access.redhat.com/security/cve/CVE-2019-6977" source="CVE"/>
        <reference ref_id="CVE-2019-6978" ref_url="https://access.redhat.com/security/cve/CVE-2019-6978" source="CVE"/>
        <description>GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. 

Security Fix(es):

* gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977)

* gd: NULL pointer dereference in gdImageClone (CVE-2018-14553)

* gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2018-14553" impact="low" public="20191220">CVE-2018-14553</cve>
          <cve cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-6977" impact="moderate" public="20181209">CVE-2019-6977</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-6978" impact="low" public="20190115">CVE-2019-6978</cve>
          <bugzilla href="https://bugzilla.redhat.com/1600727" id="1600727">CVE-2018-14553 gd: NULL pointer dereference in gdImageClone</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1671390" id="1671390">CVE-2019-6978 gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1672207" id="1672207">CVE-2019-6977 gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gd is earlier than 0:2.2.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204659001"/>
              <criterion comment="gd is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204659002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gd-devel is earlier than 0:2.2.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204659003"/>
              <criterion comment="gd-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204659004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204667" version="636">
      <metadata>
        <title>ALSA-2020:4667: mailman:2.1 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4667" ref_url="https://errata.almalinux.org/8/ALSA-2020-4667.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4667" ref_url="https://access.redhat.com/errata/RHSA-2020:4667" source="RHSA"/>
        <reference ref_id="CVE-2020-12137" ref_url="https://access.redhat.com/security/cve/CVE-2020-12137" source="CVE"/>
        <description>Mailman is a program used to help manage e-mail discussion lists.

Security Fix(es):

* mailman: XSS via file attachments in list archives (CVE-2020-12137)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-12137" impact="moderate" public="20200224">CVE-2020-12137</cve>
          <bugzilla href="https://bugzilla.redhat.com/1830007" id="1830007">CVE-2020-12137 mailman: XSS via file attachments in list archives</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module mailman:2.1 is enabled" test_ref="oval:org.almalinux.alsa:tst:20204667003"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criterion comment="mailman is earlier than 3:2.1.29-10.module+el8.3.0+6860+8e47d84b" test_ref="oval:org.almalinux.alsa:tst:20204667001"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204670" version="638">
      <metadata>
        <title>ALSA-2020:4670: idm:DL1 and idm:client security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4670" ref_url="https://errata.almalinux.org/8/ALSA-2020-4670.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4670" ref_url="https://access.redhat.com/errata/RHSA-2020:4670" source="RHSA"/>
        <reference ref_id="CVE-2015-9251" ref_url="https://access.redhat.com/security/cve/CVE-2015-9251" source="CVE"/>
        <reference ref_id="CVE-2016-10735" ref_url="https://access.redhat.com/security/cve/CVE-2016-10735" source="CVE"/>
        <reference ref_id="CVE-2018-14040" ref_url="https://access.redhat.com/security/cve/CVE-2018-14040" source="CVE"/>
        <reference ref_id="CVE-2018-14042" ref_url="https://access.redhat.com/security/cve/CVE-2018-14042" source="CVE"/>
        <reference ref_id="CVE-2018-20676" ref_url="https://access.redhat.com/security/cve/CVE-2018-20676" source="CVE"/>
        <reference ref_id="CVE-2018-20677" ref_url="https://access.redhat.com/security/cve/CVE-2018-20677" source="CVE"/>
        <reference ref_id="CVE-2019-11358" ref_url="https://access.redhat.com/security/cve/CVE-2019-11358" source="CVE"/>
        <reference ref_id="CVE-2019-8331" ref_url="https://access.redhat.com/security/cve/CVE-2019-8331" source="CVE"/>
        <reference ref_id="CVE-2020-11022" ref_url="https://access.redhat.com/security/cve/CVE-2020-11022" source="CVE"/>
        <reference ref_id="CVE-2020-1722" ref_url="https://access.redhat.com/security/cve/CVE-2020-1722" source="CVE"/>
        <description>AlmaLinux Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. 

The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)

Security Fix(es):

* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)

* bootstrap: XSS in the data-target attribute (CVE-2016-10735)

* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)

* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)

* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)

* bootstrap: XSS in the affix configuration target property (CVE-2018-20677)

* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)

* js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)

* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)

* ipa: No password length restriction leads to denial of service (CVE-2020-1722)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2015-9251" impact="moderate" public="20150627">CVE-2015-9251</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2016-10735" impact="moderate" public="20160627">CVE-2016-10735</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-14040" impact="moderate" public="20180529">CVE-2018-14040</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-14042" impact="moderate" public="20180529">CVE-2018-14042</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-20676" impact="moderate" public="20180810">CVE-2018-20676</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-20677" impact="moderate" public="20180810">CVE-2018-20677</cve>
          <cve cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11358" impact="moderate" public="20190327">CVE-2019-11358</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-8331" impact="moderate" public="20190211">CVE-2019-8331</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-11022" impact="moderate" public="20200423">CVE-2020-11022</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-1722" impact="low" public="20200414:0426">CVE-2020-1722</cve>
          <bugzilla href="https://bugzilla.redhat.com/1399546" id="1399546">CVE-2015-9251 jquery: Cross-site scripting via cross-domain ajax requests</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1601614" id="1601614">CVE-2018-14040 bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1601617" id="1601617">CVE-2018-14042 bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1668082" id="1668082">CVE-2018-20676 bootstrap: XSS in the tooltip data-viewport attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1668089" id="1668089">CVE-2018-20677 bootstrap: XSS in the affix configuration target property</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1668097" id="1668097">CVE-2016-10735 bootstrap: XSS in the data-target attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1686454" id="1686454">CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701972" id="1701972">CVE-2019-11358 jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1793071" id="1793071">CVE-2020-1722 ipa: No password length restriction leads to denial of service</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828406" id="1828406">CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module idm:DL1 is enabled" test_ref="oval:org.almalinux.alba:tst:20194268055"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="bind-dyndb-ldap is earlier than 0:11.3-1.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700011"/>
                  <criterion comment="bind-dyndb-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268002"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bind-dyndb-ldap is earlier than 0:11.3-1.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700012"/>
                  <criterion comment="bind-dyndb-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680022"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="custodia is earlier than 0:0.6.0-3.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680031"/>
                  <criterion comment="custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268004"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="custodia is earlier than 0:0.6.0-3.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680032"/>
                  <criterion comment="custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268004"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268006"/>
                  <criterion comment="ipa-client is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670005"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268008"/>
                  <criterion comment="ipa-client-common is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670007"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-epn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670010"/>
                  <criterion comment="ipa-client-epn is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670009"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-samba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268010"/>
                  <criterion comment="ipa-client-samba is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670011"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268012"/>
                  <criterion comment="ipa-common is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670013"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck is earlier than 0:0.4-6.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700151"/>
                  <criterion comment="ipa-healthcheck is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268014"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck is earlier than 0:0.4-6.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700152"/>
                  <criterion comment="ipa-healthcheck is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680142"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck-core is earlier than 0:0.4-6.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700171"/>
                  <criterion comment="ipa-healthcheck-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670018"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck-core is earlier than 0:0.4-6.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700172"/>
                  <criterion comment="ipa-healthcheck-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046700182"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-python-compat is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268018"/>
                  <criterion comment="ipa-python-compat is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670019"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670022"/>
                  <criterion comment="ipa-selinux is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670021"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268020"/>
                  <criterion comment="ipa-server is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670023"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-server-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268022"/>
                  <criterion comment="ipa-server-common is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670025"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-server-dns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268024"/>
                  <criterion comment="ipa-server-dns is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670027"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-server-trust-ad is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268026"/>
                  <criterion comment="ipa-server-trust-ad is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670029"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="opendnssec is earlier than 0:2.1.6-2.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700311"/>
                  <criterion comment="opendnssec is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268028"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="opendnssec is earlier than 0:2.1.6-2.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700312"/>
                  <criterion comment="opendnssec is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680282"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-custodia is earlier than 0:0.6.0-3.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680291"/>
                  <criterion comment="python3-custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268030"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-custodia is earlier than 0:0.6.0-3.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680292"/>
                  <criterion comment="python3-custodia is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268030"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipaclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268032"/>
                  <criterion comment="python3-ipaclient is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670035"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipalib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268034"/>
                  <criterion comment="python3-ipalib is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670037"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipaserver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268036"/>
                  <criterion comment="python3-ipaserver is earlier than 0:4.8.7-12.module+el8.3.0+8222+c1bff54a" test_ref="oval:org.almalinux.alsa:tst:20204670039"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680371"/>
                  <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680372"/>
                  <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-kdcproxy is earlier than 0:0.4-5.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alsa:tst:202046700431"/>
                  <criterion comment="python3-kdcproxy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268040"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-kdcproxy is earlier than 0:0.4-5.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alsa:tst:202046700432"/>
                  <criterion comment="python3-kdcproxy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268040"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680411"/>
                  <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680412"/>
                  <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680431"/>
                  <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680432"/>
                  <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680451"/>
                  <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680452"/>
                  <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+2603+92118e57" test_ref="oval:org.almalinux.alba:tst:201942680471"/>
                  <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+231+72a44752" test_ref="oval:org.almalinux.alba:tst:201942680472"/>
                  <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slapi-nis is earlier than 0:0.56.5-4.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700531"/>
                  <criterion comment="slapi-nis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slapi-nis is earlier than 0:0.56.5-4.module_el8.3.0+511+8a502f20" test_ref="oval:org.almalinux.alsa:tst:202046700532"/>
                  <criterion comment="slapi-nis is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680502"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="softhsm is earlier than 0:2.6.0-3.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700551"/>
                  <criterion comment="softhsm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="softhsm is earlier than 0:2.6.0-3.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700552"/>
                  <criterion comment="softhsm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="softhsm-devel is earlier than 0:2.6.0-3.module_el8.3.0+2037+0bba7131" test_ref="oval:org.almalinux.alsa:tst:202046700571"/>
                  <criterion comment="softhsm-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="softhsm-devel is earlier than 0:2.6.0-3.module_el8.3.0+482+9e103aab" test_ref="oval:org.almalinux.alsa:tst:202046700572"/>
                  <criterion comment="softhsm-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680542"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module idm:client is enabled" test_ref="oval:org.almalinux.alsa:tst:20204670075"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="ipa-client is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700601"/>
                  <criterion comment="ipa-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700602"/>
                  <criterion comment="ipa-client is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-common is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700611"/>
                  <criterion comment="ipa-client-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268008"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-common is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700612"/>
                  <criterion comment="ipa-client-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680082"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-epn is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700621"/>
                  <criterion comment="ipa-client-epn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670010"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-epn is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700622"/>
                  <criterion comment="ipa-client-epn is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046700102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-samba is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700631"/>
                  <criterion comment="ipa-client-samba is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268010"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-client-samba is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700632"/>
                  <criterion comment="ipa-client-samba is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-common is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700641"/>
                  <criterion comment="ipa-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268012"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-common is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700642"/>
                  <criterion comment="ipa-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680122"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck-core is earlier than 0:0.4-6.module_el8.3.0+2036+6212645f" test_ref="oval:org.almalinux.alsa:tst:202046700651"/>
                  <criterion comment="ipa-healthcheck-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670018"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-healthcheck-core is earlier than 0:0.4-6.module_el8.3.0+481+b9a999c3" test_ref="oval:org.almalinux.alsa:tst:202046700652"/>
                  <criterion comment="ipa-healthcheck-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046700182"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-python-compat is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700661"/>
                  <criterion comment="ipa-python-compat is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268018"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-python-compat is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700662"/>
                  <criterion comment="ipa-python-compat is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680182"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-selinux is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700671"/>
                  <criterion comment="ipa-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204670022"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ipa-selinux is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700672"/>
                  <criterion comment="ipa-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046700222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipaclient is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700681"/>
                  <criterion comment="python3-ipaclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268032"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipaclient is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700682"/>
                  <criterion comment="python3-ipaclient is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipalib is earlier than 0:4.8.7-12.module_el8.3.0+2036+6212645f.alma" test_ref="oval:org.almalinux.alsa:tst:202046700691"/>
                  <criterion comment="python3-ipalib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268034"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-ipalib is earlier than 0:4.8.7-12.module_el8.3.0+514+e7703106" test_ref="oval:org.almalinux.alsa:tst:202046700692"/>
                  <criterion comment="python3-ipalib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201942680342"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+2588+bab6f12d" test_ref="oval:org.almalinux.alsa:tst:202046700701"/>
                  <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-jwcrypto is earlier than 0:0.5.0-1.module_el8.5.0+80+5cbbea0e" test_ref="oval:org.almalinux.alsa:tst:202046700702"/>
                  <criterion comment="python3-jwcrypto is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268038"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+2588+bab6f12d" test_ref="oval:org.almalinux.alsa:tst:202046700711"/>
                  <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pyusb is earlier than 0:1.0.0-9.module_el8.5.0+80+5cbbea0e" test_ref="oval:org.almalinux.alsa:tst:202046700712"/>
                  <criterion comment="python3-pyusb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268042"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+2588+bab6f12d" test_ref="oval:org.almalinux.alsa:tst:202046700721"/>
                  <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode is earlier than 0:5.1-12.module_el8.5.0+80+5cbbea0e" test_ref="oval:org.almalinux.alsa:tst:202046700722"/>
                  <criterion comment="python3-qrcode is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268044"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+2588+bab6f12d" test_ref="oval:org.almalinux.alsa:tst:202046700731"/>
                  <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-qrcode-core is earlier than 0:5.1-12.module_el8.5.0+80+5cbbea0e" test_ref="oval:org.almalinux.alsa:tst:202046700732"/>
                  <criterion comment="python3-qrcode-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268046"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+2588+bab6f12d" test_ref="oval:org.almalinux.alsa:tst:202046700741"/>
                  <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-yubico is earlier than 0:1.3.2-9.module_el8.5.0+80+5cbbea0e" test_ref="oval:org.almalinux.alsa:tst:202046700742"/>
                  <criterion comment="python3-yubico is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20194268048"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204676" version="636">
      <metadata>
        <title>ALSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4676" ref_url="https://errata.almalinux.org/8/ALSA-2020-4676.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4676" ref_url="https://access.redhat.com/errata/RHSA-2020:4676" source="RHSA"/>
        <reference ref_id="CVE-2019-15890" ref_url="https://access.redhat.com/security/cve/CVE-2019-15890" source="CVE"/>
        <reference ref_id="CVE-2019-20485" ref_url="https://access.redhat.com/security/cve/CVE-2019-20485" source="CVE"/>
        <reference ref_id="CVE-2020-10703" ref_url="https://access.redhat.com/security/cve/CVE-2020-10703" source="CVE"/>
        <reference ref_id="CVE-2020-14301" ref_url="https://access.redhat.com/security/cve/CVE-2020-14301" source="CVE"/>
        <reference ref_id="CVE-2020-14339" ref_url="https://access.redhat.com/security/cve/CVE-2020-14339" source="CVE"/>
        <reference ref_id="CVE-2020-1983" ref_url="https://access.redhat.com/security/cve/CVE-2020-1983" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)

Security Fix(es):

* libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339)

* QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890)

* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485)

* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)

* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)

* libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-15890" impact="moderate" public="20190825">CVE-2019-15890</cve>
          <cve cvss3="5.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-20485" impact="moderate" public="20191205">CVE-2019-20485</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-10703" impact="moderate" public="20200114">CVE-2020-10703</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-14301" impact="low" public="20200414">CVE-2020-14301</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-772" href="https://access.redhat.com/security/cve/CVE-2020-14339" impact="important" public="20200717">CVE-2020-14339</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-1983" impact="moderate" public="20200402">CVE-2020-1983</cve>
          <bugzilla href="https://bugzilla.redhat.com/1749716" id="1749716">CVE-2019-15890 QEMU: Slirp: use-after-free during packet reassembly</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1809740" id="1809740">CVE-2019-20485 libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1816650" id="1816650">CVE-2020-10703 libvirt: Potential denial of service via active pool without target path</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1829825" id="1829825">CVE-2020-1983 QEMU: slirp: use-after-free in ip_reass() function in ip_input.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848640" id="1848640">CVE-2020-14301 libvirt: leak of sensitive cookie information via dumpxml</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1860069" id="1860069">CVE-2020-14339 libvirt: leak of /dev/mapper/control into QEMU guests</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20191022-3.git899d9883.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760011"/>
                  <criterion comment="SLOF is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175002"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760031"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046760032"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046760033"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760051"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046760052"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046760053"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760071"/>
                  <criterion comment="libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175008"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760072"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760091"/>
                  <criterion comment="libguestfs-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175010"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760092"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760111"/>
                  <criterion comment="libguestfs-benchmarking is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175012"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760112"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760131"/>
                  <criterion comment="libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175014"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760132"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760151"/>
                  <criterion comment="libguestfs-gfs2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175016"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760152"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760171"/>
                  <criterion comment="libguestfs-gobject is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175018"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760172"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175020"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760192"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175022"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760212"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760231"/>
                  <criterion comment="libguestfs-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175024"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760232"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760251"/>
                  <criterion comment="libguestfs-java-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175026"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760252"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760271"/>
                  <criterion comment="libguestfs-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175028"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760272"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175030"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760292"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175032"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760312"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760331"/>
                  <criterion comment="libguestfs-rescue is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175034"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760332"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760351"/>
                  <criterion comment="libguestfs-rsync is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175036"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760352"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760371"/>
                  <criterion comment="libguestfs-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175038"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760372"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760391"/>
                  <criterion comment="libguestfs-tools-c is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760392"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760411"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760412"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760431"/>
                  <criterion comment="libguestfs-xfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175044"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760432"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760511"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760512"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760531"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760532"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760551"/>
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760571"/>
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760591"/>
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760611"/>
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760631"/>
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760651"/>
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760671"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760691"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760711"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760731"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760751"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760771"/>
                  <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760791"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760811"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760831"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760851"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760871"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760891"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760911"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760931"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760951"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760971"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760991"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761011"/>
                  <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761031"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761032"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761051"/>
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761071"/>
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761091"/>
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761111"/>
                  <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761131"/>
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761151"/>
                  <criterion comment="lua-guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175112"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761152"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761171"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761172"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761191"/>
                  <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761192"/>
                  <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761211"/>
                  <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761212"/>
                  <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-filters is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761231"/>
                  <criterion comment="nbdkit-basic-filters is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676124"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-filters is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761232"/>
                  <criterion comment="nbdkit-basic-filters is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676124"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761251"/>
                  <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761252"/>
                  <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-curl-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761271"/>
                  <criterion comment="nbdkit-curl-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676128"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-curl-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761272"/>
                  <criterion comment="nbdkit-curl-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676128"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761291"/>
                  <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761292"/>
                  <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761311"/>
                  <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761312"/>
                  <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-gzip-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761331"/>
                  <criterion comment="nbdkit-gzip-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-gzip-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761332"/>
                  <criterion comment="nbdkit-gzip-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-linuxdisk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761351"/>
                  <criterion comment="nbdkit-linuxdisk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-linuxdisk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761352"/>
                  <criterion comment="nbdkit-linuxdisk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-python-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761371"/>
                  <criterion comment="nbdkit-python-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-python-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761372"/>
                  <criterion comment="nbdkit-python-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-server is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761391"/>
                  <criterion comment="nbdkit-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-server is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761392"/>
                  <criterion comment="nbdkit-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-ssh-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761411"/>
                  <criterion comment="nbdkit-ssh-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-ssh-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761412"/>
                  <criterion comment="nbdkit-ssh-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-vddk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761431"/>
                  <criterion comment="nbdkit-vddk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-xz-filter is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761451"/>
                  <criterion comment="nbdkit-xz-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-xz-filter is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761452"/>
                  <criterion comment="nbdkit-xz-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761531"/>
                  <criterion comment="perl-Sys-Guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761532"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761551"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761552"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761571"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761572"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761573"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761591"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761592"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761593"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761611"/>
                  <criterion comment="python3-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175148"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761612"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761631"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761632"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761651"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761652"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761671"/>
                  <criterion comment="qemu-guest-agent is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175152"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761672"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761691"/>
                  <criterion comment="qemu-img is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175154"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761692"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761711"/>
                  <criterion comment="qemu-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175156"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761712"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761731"/>
                  <criterion comment="qemu-kvm-block-curl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175158"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761732"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761751"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175160"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761771"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761772"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761791"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761792"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761811"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175166"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761812"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761831"/>
                  <criterion comment="qemu-kvm-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175168"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761832"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046761851"/>
                  <criterion comment="qemu-kvm-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175170"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046761852"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761871"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761872"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761873"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761891"/>
                  <criterion comment="ruby-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175174"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761892"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761911"/>
                  <criterion comment="seabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175176"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761931"/>
                  <criterion comment="seabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175178"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761951"/>
                  <criterion comment="seavgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175180"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-10.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046762011"/>
                  <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-10.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046762012"/>
                  <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-10.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046762031"/>
                  <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-10.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046762032"/>
                  <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762051"/>
                  <criterion comment="virt-dib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175190"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762052"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762071"/>
                  <criterion comment="virt-v2v is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175194"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762101"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762111"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762121"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762161"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762171"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762181"/>
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762191"/>
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762201"/>
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762211"/>
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762221"/>
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762231"/>
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762241"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762251"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762261"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762271"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762281"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762291"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762301"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762311"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762321"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762331"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762341"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762351"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762361"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762371"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762381"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762391"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762401"/>
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762411"/>
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762421"/>
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762431"/>
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762441"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762481"/>
                  <criterion comment="ocaml-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345229"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762501"/>
                  <criterion comment="ocaml-hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345231"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762521"/>
                  <criterion comment="ocaml-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345233"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762522"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762541"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345235"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762542"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762561"/>
                  <criterion comment="ocaml-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676257"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libnbd-devel is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762581"/>
                  <criterion comment="ocaml-libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676259"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762601"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762611"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762621"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762631"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762641"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202046762651"/>
                  <criterion comment="qemu-kvm-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345241"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202046762652"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762671"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204682" version="642">
      <metadata>
        <title>ALSA-2020:4682: grafana security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4682" ref_url="https://errata.almalinux.org/8/ALSA-2020-4682.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4682" ref_url="https://access.redhat.com/errata/RHSA-2020:4682" source="RHSA"/>
        <reference ref_id="CVE-2018-18624" ref_url="https://access.redhat.com/security/cve/CVE-2018-18624" source="CVE"/>
        <reference ref_id="CVE-2019-19499" ref_url="https://access.redhat.com/security/cve/CVE-2019-19499" source="CVE"/>
        <reference ref_id="CVE-2020-11110" ref_url="https://access.redhat.com/security/cve/CVE-2020-11110" source="CVE"/>
        <reference ref_id="CVE-2020-12052" ref_url="https://access.redhat.com/security/cve/CVE-2020-12052" source="CVE"/>
        <reference ref_id="CVE-2020-12245" ref_url="https://access.redhat.com/security/cve/CVE-2020-12245" source="CVE"/>
        <reference ref_id="CVE-2020-12458" ref_url="https://access.redhat.com/security/cve/CVE-2020-12458" source="CVE"/>
        <reference ref_id="CVE-2020-12459" ref_url="https://access.redhat.com/security/cve/CVE-2020-12459" source="CVE"/>
        <reference ref_id="CVE-2020-13430" ref_url="https://access.redhat.com/security/cve/CVE-2020-13430" source="CVE"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB. 

The following packages have been upgraded to a later upstream version: grafana (6.7.4). (BZ#1807323)

Security Fix(es):

* grafana: XSS vulnerability via a column style on the "Dashboard &gt; Table Panel" screen (CVE-2018-18624)

* grafana: arbitrary file read via MySQL data source (CVE-2019-19499)

* grafana: stored XSS (CVE-2020-11110)

* grafana: XSS annotation popup vulnerability (CVE-2020-12052)

* grafana: XSS via column.title or cellLinkTooltip (CVE-2020-12245)

* grafana: information disclosure through world-readable /var/lib/grafana/grafana.db (CVE-2020-12458)

* grafana: information disclosure through world-readable grafana configuration files (CVE-2020-12459)

* grafana: XSS via the OpenTSDB datasource (CVE-2020-13430)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-18624" impact="moderate" public="20200602">CVE-2018-18624</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-88-&gt;CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-19499" impact="moderate" public="20200827">CVE-2019-19499</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-11110" impact="moderate" public="20200401">CVE-2020-11110</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-12052" impact="moderate" public="20200427">CVE-2020-12052</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-12245" impact="moderate" public="20200423">CVE-2020-12245</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2020-12458" impact="moderate" public="20200423:2000">CVE-2020-12458</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-732" href="https://access.redhat.com/security/cve/CVE-2020-12459" impact="moderate" public="20200423:2000">CVE-2020-12459</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-13430" impact="moderate" public="20200524">CVE-2020-13430</cve>
          <bugzilla href="https://bugzilla.redhat.com/1827765" id="1827765">CVE-2020-12458 grafana: information disclosure through world-readable /var/lib/grafana/grafana.db</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1829724" id="1829724">CVE-2020-12459 grafana: information disclosure through world-readable grafana configuration files</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848089" id="1848089">CVE-2020-12052 grafana: XSS annotation popup vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848108" id="1848108">CVE-2020-13430 grafana: XSS via the OpenTSDB datasource</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1848643" id="1848643">CVE-2020-12245 grafana: XSS via column.title or cellLinkTooltip</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1850572" id="1850572">CVE-2018-18624 grafana: XSS vulnerability via a column style on the "Dashboard &gt; Table Panel" screen</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1861044" id="1861044">CVE-2020-11110 grafana: stored XSS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1873615" id="1873615">CVE-2019-19499 grafana: arbitrary file read via MySQL data source</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="grafana is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682001"/>
              <criterion comment="grafana is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-azure-monitor is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682003"/>
              <criterion comment="grafana-azure-monitor is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-cloudwatch is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682005"/>
              <criterion comment="grafana-cloudwatch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-elasticsearch is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682007"/>
              <criterion comment="grafana-elasticsearch is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-graphite is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682009"/>
              <criterion comment="grafana-graphite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-influxdb is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682011"/>
              <criterion comment="grafana-influxdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-loki is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682013"/>
              <criterion comment="grafana-loki is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mssql is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682015"/>
              <criterion comment="grafana-mssql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-mysql is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682017"/>
              <criterion comment="grafana-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-opentsdb is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682019"/>
              <criterion comment="grafana-opentsdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-postgres is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682021"/>
              <criterion comment="grafana-postgres is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-prometheus is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682023"/>
              <criterion comment="grafana-prometheus is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grafana-stackdriver is earlier than 0:6.7.4-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204682025"/>
              <criterion comment="grafana-stackdriver is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201659026"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204685" version="635">
      <metadata>
        <title>ALSA-2020:4685: kernel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4685" ref_url="https://errata.almalinux.org/8/ALSA-2020-4685.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4685" ref_url="https://access.redhat.com/errata/RHSA-2020:4685" source="RHSA"/>
        <reference ref_id="CVE-2020-24490" ref_url="https://access.redhat.com/security/cve/CVE-2020-24490" source="CVE"/>
        <reference ref_id="CVE-2020-25661" ref_url="https://access.redhat.com/security/cve/CVE-2020-25661" source="CVE"/>
        <reference ref_id="CVE-2020-25662" ref_url="https://access.redhat.com/security/cve/CVE-2020-25662" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events (CVE-2020-24490)

* kernel: Red Hat only CVE-2020-12351 regression (CVE-2020-25661)

* kernel: Red Hat only CVE-2020-12352 regression (CVE-2020-25662)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-24490" impact="moderate" public="20201014">CVE-2020-24490</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-25661" impact="important" public="20201103">CVE-2020-25661</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-284-&gt;CWE-201" href="https://access.redhat.com/security/cve/CVE-2020-25662" impact="moderate" public="20201103">CVE-2020-25662</cve>
          <bugzilla href="https://bugzilla.redhat.com/1888449" id="1888449">CVE-2020-24490 kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891483" id="1891483">CVE-2020-25661 kernel: Red Hat only CVE-2020-12351 regression</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891484" id="1891484">CVE-2020-25662 kernel: Red Hat only CVE-2020-12352 regression</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-240.1.1.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204685049"/>
            <criterion comment="kernel earlier than 0:4.18.0-240.1.1.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204685050"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685025"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685027"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685029"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685031"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685033"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685035"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685037"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685039"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685041"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685043"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685045"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-240.1.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204685047"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204686" version="636">
      <metadata>
        <title>ALSA-2020:4686: kernel-rt security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4686" ref_url="https://errata.almalinux.org/8/ALSA-2020-4686.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4686" ref_url="https://access.redhat.com/errata/RHSA-2020:4686" source="RHSA"/>
        <reference ref_id="CVE-2020-24490" ref_url="https://access.redhat.com/security/cve/CVE-2020-24490" source="CVE"/>
        <reference ref_id="CVE-2020-25661" ref_url="https://access.redhat.com/security/cve/CVE-2020-25661" source="CVE"/>
        <reference ref_id="CVE-2020-25662" ref_url="https://access.redhat.com/security/cve/CVE-2020-25662" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events (CVE-2020-24490)

* kernel: Red Hat only CVE-2020-12351 regression (CVE-2020-25661)

* kernel: Red Hat only CVE-2020-12352 regression (CVE-2020-25662)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-24490" impact="moderate" public="20201014">CVE-2020-24490</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2020-25661" impact="important" public="20201103">CVE-2020-25661</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-284-&gt;CWE-201" href="https://access.redhat.com/security/cve/CVE-2020-25662" impact="moderate" public="20201103">CVE-2020-25662</cve>
          <bugzilla href="https://bugzilla.redhat.com/1888449" id="1888449">CVE-2020-24490 kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891483" id="1891483">CVE-2020-25661 kernel: Red Hat only CVE-2020-12351 regression</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891484" id="1891484">CVE-2020-25662 kernel: Red Hat only CVE-2020-12352 regression</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.1.1.rt7.55.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20204685049"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.1.1.rt7.55.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20204686026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-240.1.1.rt7.55.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204686023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204687" version="635">
      <metadata>
        <title>ALSA-2020:4687: oddjob security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4687" ref_url="https://errata.almalinux.org/8/ALSA-2020-4687.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4687" ref_url="https://access.redhat.com/errata/RHSA-2020:4687" source="RHSA"/>
        <reference ref_id="CVE-2020-10737" ref_url="https://access.redhat.com/security/cve/CVE-2020-10737" source="CVE"/>
        <description>The oddjob packages contain a D-Bus service which performs particular tasks for clients which connect to it and issue requests using the system-wide message bus.

The following packages have been upgraded to a later upstream version: oddjob (0.34.5). (BZ#1833289)

Security Fix(es):

* oddjob: race condition in oddjob_selinux_mkdir function in mkhomedir.c can lead to symlink attack (CVE-2020-10737)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-10737" impact="moderate" public="20200507">CVE-2020-10737</cve>
          <bugzilla href="https://bugzilla.redhat.com/1833042" id="1833042">CVE-2020-10737 oddjob: race condition in oddjob_selinux_mkdir function in mkhomedir.c can lead to symlink attack</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="oddjob is earlier than 0:0.34.5-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204687001"/>
              <criterion comment="oddjob is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204687002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oddjob-mkhomedir is earlier than 0:0.34.5-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204687003"/>
              <criterion comment="oddjob-mkhomedir is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204687004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204689" version="637">
      <metadata>
        <title>ALSA-2020:4689: openwsman security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4689" ref_url="https://errata.almalinux.org/8/ALSA-2020-4689.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4689" ref_url="https://access.redhat.com/errata/RHSA-2020:4689" source="RHSA"/>
        <reference ref_id="CVE-2019-3833" ref_url="https://access.redhat.com/security/cve/CVE-2019-3833" source="CVE"/>
        <description>Openwsman is a project intended to provide an open source implementation of the Web Services Management specification (WS-Management) and to expose system management information on the Linux operating system using the WS-Management protocol. WS-Management is based on a suite of web services specifications and usage requirements that cover all system management aspects.

Security Fix(es):

* openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2019-3833" impact="moderate" public="20190312">CVE-2019-3833</cve>
          <bugzilla href="https://bugzilla.redhat.com/1674478" id="1674478">CVE-2019-3833 openwsman: Infinite loop in process_connection() allows denial of service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libwsman-devel is earlier than 0:2.6.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204689001"/>
              <criterion comment="libwsman-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libwsman1 is earlier than 0:2.6.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204689003"/>
              <criterion comment="libwsman1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-client is earlier than 0:2.6.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204689005"/>
              <criterion comment="openwsman-client is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-python3 is earlier than 0:2.6.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204689007"/>
              <criterion comment="openwsman-python3 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openwsman-server is earlier than 0:2.6.5-7.el8" test_ref="oval:org.almalinux.alsa:tst:20204689009"/>
              <criterion comment="openwsman-server is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190972010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204690" version="636">
      <metadata>
        <title>ALSA-2020:4690: qt5-qtbase and qt5-qtwebsockets security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4690" ref_url="https://errata.almalinux.org/8/ALSA-2020-4690.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4690" ref_url="https://access.redhat.com/errata/RHSA-2020:4690" source="RHSA"/>
        <reference ref_id="CVE-2015-9541" ref_url="https://access.redhat.com/security/cve/CVE-2015-9541" source="CVE"/>
        <reference ref_id="CVE-2018-21035" ref_url="https://access.redhat.com/security/cve/CVE-2018-21035" source="CVE"/>
        <reference ref_id="CVE-2020-0569" ref_url="https://access.redhat.com/security/cve/CVE-2020-0569" source="CVE"/>
        <reference ref_id="CVE-2020-0570" ref_url="https://access.redhat.com/security/cve/CVE-2020-0570" source="CVE"/>
        <reference ref_id="CVE-2020-13962" ref_url="https://access.redhat.com/security/cve/CVE-2020-13962" source="CVE"/>
        <description>Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. 

Security Fix(es):

* qt: XML entity expansion vulnerability (CVE-2015-9541)

* qt5-qtwebsockets: websocket implementation allows only limited size for frames and messages therefore attacker can cause DOS (CVE-2018-21035)

* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0569)

* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0570)

* qt5: incorrectly calls SSL_shutdown() in OpenSSL mid-handshake causing denial of service in TLS applications (CVE-2020-13962)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-776" href="https://access.redhat.com/security/cve/CVE-2015-9541" impact="moderate" public="20150724">CVE-2015-9541</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-21035" impact="moderate" public="20180923">CVE-2018-21035</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-73" href="https://access.redhat.com/security/cve/CVE-2020-0569" impact="moderate" public="20200207">CVE-2020-0569</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-73" href="https://access.redhat.com/security/cve/CVE-2020-0570" impact="moderate" public="20200207">CVE-2020-0570</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-391" href="https://access.redhat.com/security/cve/CVE-2020-13962" impact="moderate" public="20200609">CVE-2020-13962</cve>
          <bugzilla href="https://bugzilla.redhat.com/1800600" id="1800600">CVE-2020-0569 qt: files placed by attacker can influence the working directory and lead to malicious code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1800604" id="1800604">CVE-2020-0570 qt: files placed by attacker can influence the working directory and lead to malicious code execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1801369" id="1801369">CVE-2015-9541 qt: XML entity expansion vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1810964" id="1810964">CVE-2018-21035 qt5-qtwebsockets: websocket implementation allows only limited size for frames and messages therefore attacker can cause DOS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1849734" id="1849734">CVE-2020-13962 qt5: incorrectly calls SSL_shutdown() in OpenSSL mid-handshake causing denial of service in TLS applications</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690001"/>
              <criterion comment="qt5-qtwebsockets is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665138"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets-devel is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690003"/>
              <criterion comment="qt5-qtwebsockets-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665140"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtwebsockets-examples is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690005"/>
              <criterion comment="qt5-qtwebsockets-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-assistant is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690007"/>
              <criterion comment="qt5-assistant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-designer is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690009"/>
              <criterion comment="qt5-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-doctools is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690011"/>
              <criterion comment="qt5-doctools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-linguist is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690013"/>
              <criterion comment="qt5-linguist is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qdbusviewer is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690015"/>
              <criterion comment="qt5-qdbusviewer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690017"/>
              <criterion comment="qt5-qttools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-common is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690019"/>
              <criterion comment="qt5-qttools-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-devel is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690021"/>
              <criterion comment="qt5-qttools-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-examples is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690023"/>
              <criterion comment="qt5-qttools-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designer is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690025"/>
              <criterion comment="qt5-qttools-libs-designer is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-designercomponents is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690027"/>
              <criterion comment="qt5-qttools-libs-designercomponents is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-libs-help is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690029"/>
              <criterion comment="qt5-qttools-libs-help is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qttools-static is earlier than 0:5.12.5-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204690031"/>
              <criterion comment="qt5-qttools-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690033"/>
              <criterion comment="qt5-qtbase is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-common is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690035"/>
              <criterion comment="qt5-qtbase-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-devel is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690037"/>
              <criterion comment="qt5-qtbase-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-examples is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690039"/>
              <criterion comment="qt5-qtbase-examples is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-gui is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690041"/>
              <criterion comment="qt5-qtbase-gui is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-mysql is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690043"/>
              <criterion comment="qt5-qtbase-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-odbc is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690045"/>
              <criterion comment="qt5-qtbase-odbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-postgresql is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690047"/>
              <criterion comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-private-devel is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690049"/>
              <criterion comment="qt5-qtbase-private-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201665176"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="qt5-qtbase-static is earlier than 0:5.12.5-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204690051"/>
              <criterion comment="qt5-qtbase-static is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193390018"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204694" version="636">
      <metadata>
        <title>ALSA-2020:4694: container-tools:rhel8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4694" ref_url="https://errata.almalinux.org/8/ALSA-2020-4694.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4694" ref_url="https://access.redhat.com/errata/RHSA-2020:4694" source="RHSA"/>
        <reference ref_id="CVE-2020-10749" ref_url="https://access.redhat.com/security/cve/CVE-2020-10749" source="CVE"/>
        <reference ref_id="CVE-2020-10756" ref_url="https://access.redhat.com/security/cve/CVE-2020-10756" source="CVE"/>
        <reference ref_id="CVE-2020-14040" ref_url="https://access.redhat.com/security/cve/CVE-2020-14040" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)

* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)

* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cwe="CWE-300" href="https://access.redhat.com/security/cve/CVE-2020-10749" impact="moderate" public="20200601">CVE-2020-10749</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-10756" impact="moderate" public="20200527">CVE-2020-10756</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://access.redhat.com/security/cve/CVE-2020-14040" impact="moderate" public="20200617">CVE-2020-14040</cve>
          <bugzilla href="https://bugzilla.redhat.com/1833220" id="1833220">CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835986" id="1835986">CVE-2020-10756 QEMU: slirp: networking out-of-bounds read information disclosure vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853652" id="1853652">CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
              <criterion comment="buildah is earlier than 0:1.15.1-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
              <criterion comment="buildah-tests is earlier than 0:1.15.1-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="cockpit-podman is earlier than 0:18.1-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348008"/>
              <criterion comment="conmon is earlier than 2:2.0.20-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="container-selinux is earlier than 2:2.144.0-1.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.6-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
              <criterion comment="containers-common is earlier than 1:1.1.1-3.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
              <criterion comment="crit is earlier than 0:3.14-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
              <criterion comment="criu is earlier than 0:3.14-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crun is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694020"/>
              <criterion comment="crun is earlier than 0:0.14.1-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694019"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
              <criterion comment="fuse-overlayfs is earlier than 0:1.1.2-3.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694021"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp is earlier than 0:4.3.1-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202046940231"/>
              <criterion comment="libslirp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp is earlier than 0:4.3.1-1.module_el8.4.0+575+63b40ad7" test_ref="oval:org.almalinux.alsa:tst:202046940232"/>
              <criterion comment="libslirp is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202030530222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp-devel is earlier than 0:4.3.1-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202046940251"/>
              <criterion comment="libslirp-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp-devel is earlier than 0:4.3.1-1.module_el8.4.0+575+63b40ad7" test_ref="oval:org.almalinux.alsa:tst:202046940252"/>
              <criterion comment="libslirp-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202030530242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-seccomp-bpf-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694028"/>
              <criterion comment="oci-seccomp-bpf-hook is earlier than 0:1.1.2-3.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694027"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
              <criterion comment="podman is earlier than 0:2.0.5-5.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694029"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-catatonit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694032"/>
              <criterion comment="podman-catatonit is earlier than 0:2.0.5-5.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694031"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="podman-docker is earlier than 0:2.0.5-5.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694033"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
              <criterion comment="podman-remote is earlier than 0:2.0.5-5.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694035"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
              <criterion comment="podman-tests is earlier than 0:2.0.5-5.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694037"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202046940391"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202046940392"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
              <criterion comment="python3-criu is earlier than 0:3.14-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694041"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
              <criterion comment="runc is earlier than 0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694043"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
              <criterion comment="skopeo is earlier than 1:1.1.1-3.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694045"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
              <criterion comment="skopeo-tests is earlier than 1:1.1.1-3.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694047"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
              <criterion comment="slirp4netns is earlier than 0:1.1.4-2.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694049"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.8-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202046940511"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.8-1.module_el8.4.0+781+acf4c33b" test_ref="oval:org.almalinux.alsa:tst:202046940512"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="udica is earlier than 0:0.2.2-1.module+el8.3.0+8221+97165c3f" test_ref="oval:org.almalinux.alsa:tst:20204694053"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204697" version="640">
      <metadata>
        <title>ALSA-2020:4697: targetcli security and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4697" ref_url="https://errata.almalinux.org/8/ALSA-2020-4697.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4697" ref_url="https://access.redhat.com/errata/RHSA-2020:4697" source="RHSA"/>
        <reference ref_id="CVE-2020-13867" ref_url="https://access.redhat.com/security/cve/CVE-2020-13867" source="CVE"/>
        <description>The targetcli package contains an administration shell for configuring Internet Small Computer System Interface (iSCSI), Fibre Channel over Ethernet (FCoE), and other SCSI targets, using the Target Core Mod/Linux-IO (TCM/LIO) kernel target subsystem. FCoE users also need to install and use the fcoe-utils package.

The following packages have been upgraded to a later upstream version: targetcli (2.1.53). (BZ#1845167)

Security Fix(es):

* targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-276" href="https://access.redhat.com/security/cve/CVE-2020-13867" impact="moderate" public="20200605">CVE-2020-13867</cve>
          <bugzilla href="https://bugzilla.redhat.com/1848143" id="1848143">CVE-2020-13867 targetcli: weak permissions for /etc/target and backup files</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="targetcli is earlier than 0:2.1.53-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204697001"/>
          <criterion comment="targetcli is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201933002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204709" version="636">
      <metadata>
        <title>ALSA-2020:4709: librsvg2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4709" ref_url="https://errata.almalinux.org/8/ALSA-2020-4709.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4709" ref_url="https://access.redhat.com/errata/RHSA-2020:4709" source="RHSA"/>
        <reference ref_id="CVE-2019-20446" ref_url="https://access.redhat.com/security/cve/CVE-2019-20446" source="CVE"/>
        <description>The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.

Security Fix(es):

* librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-20446" impact="moderate" public="20200202">CVE-2019-20446</cve>
          <bugzilla href="https://bugzilla.redhat.com/1797608" id="1797608">CVE-2019-20446 librsvg: Resource exhaustion via crafted SVG file with nested patterns</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="librsvg2 is earlier than 0:2.42.7-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204709001"/>
              <criterion comment="librsvg2 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204709002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="librsvg2-devel is earlier than 0:2.42.7-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204709003"/>
              <criterion comment="librsvg2-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204709004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="librsvg2-tools is earlier than 0:2.42.7-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204709005"/>
              <criterion comment="librsvg2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204709006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204712" version="636">
      <metadata>
        <title>ALSA-2020:4712: subversion:1.10 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4712" ref_url="https://errata.almalinux.org/8/ALSA-2020-4712.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4712" ref_url="https://access.redhat.com/errata/RHSA-2020:4712" source="RHSA"/>
        <reference ref_id="CVE-2018-11782" ref_url="https://access.redhat.com/security/cve/CVE-2018-11782" source="CVE"/>
        <description>Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.

Security Fix(es):

* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://access.redhat.com/security/cve/CVE-2018-11782" impact="moderate" public="20190731:1200">CVE-2018-11782</cve>
          <bugzilla href="https://bugzilla.redhat.com/1733088" id="1733088">CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module subversion:1.10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192512021"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120011"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120012"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202047120013"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_dav_svn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512004"/>
              <criterion comment="mod_dav_svn is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512006"/>
              <criterion comment="subversion is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512008"/>
              <criterion comment="subversion-devel is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-gnome is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512010"/>
              <criterion comment="subversion-gnome is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712009"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-javahl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512012"/>
              <criterion comment="subversion-javahl is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712011"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512014"/>
              <criterion comment="subversion-libs is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712013"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512016"/>
              <criterion comment="subversion-perl is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712015"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512018"/>
              <criterion comment="subversion-tools is earlier than 0:1.10.2-3.module+el8.3.0+6671+2675c974" test_ref="oval:org.almalinux.alsa:tst:20204712017"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120191"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120192"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202047120193"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204743" version="637">
      <metadata>
        <title>ALSA-2020:4743: squid:4 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4743" ref_url="https://errata.almalinux.org/8/ALSA-2020-4743.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4743" ref_url="https://access.redhat.com/errata/RHSA-2020:4743" source="RHSA"/>
        <reference ref_id="CVE-2019-12520" ref_url="https://access.redhat.com/security/cve/CVE-2019-12520" source="CVE"/>
        <reference ref_id="CVE-2019-12521" ref_url="https://access.redhat.com/security/cve/CVE-2019-12521" source="CVE"/>
        <reference ref_id="CVE-2019-12523" ref_url="https://access.redhat.com/security/cve/CVE-2019-12523" source="CVE"/>
        <reference ref_id="CVE-2019-12524" ref_url="https://access.redhat.com/security/cve/CVE-2019-12524" source="CVE"/>
        <reference ref_id="CVE-2019-12526" ref_url="https://access.redhat.com/security/cve/CVE-2019-12526" source="CVE"/>
        <reference ref_id="CVE-2019-12528" ref_url="https://access.redhat.com/security/cve/CVE-2019-12528" source="CVE"/>
        <reference ref_id="CVE-2019-12529" ref_url="https://access.redhat.com/security/cve/CVE-2019-12529" source="CVE"/>
        <reference ref_id="CVE-2019-12854" ref_url="https://access.redhat.com/security/cve/CVE-2019-12854" source="CVE"/>
        <reference ref_id="CVE-2019-18676" ref_url="https://access.redhat.com/security/cve/CVE-2019-18676" source="CVE"/>
        <reference ref_id="CVE-2019-18677" ref_url="https://access.redhat.com/security/cve/CVE-2019-18677" source="CVE"/>
        <reference ref_id="CVE-2019-18678" ref_url="https://access.redhat.com/security/cve/CVE-2019-18678" source="CVE"/>
        <reference ref_id="CVE-2019-18679" ref_url="https://access.redhat.com/security/cve/CVE-2019-18679" source="CVE"/>
        <reference ref_id="CVE-2019-18860" ref_url="https://access.redhat.com/security/cve/CVE-2019-18860" source="CVE"/>
        <reference ref_id="CVE-2020-14058" ref_url="https://access.redhat.com/security/cve/CVE-2020-14058" source="CVE"/>
        <reference ref_id="CVE-2020-15049" ref_url="https://access.redhat.com/security/cve/CVE-2020-15049" source="CVE"/>
        <reference ref_id="CVE-2020-24606" ref_url="https://access.redhat.com/security/cve/CVE-2020-24606" source="CVE"/>
        <reference ref_id="CVE-2020-8449" ref_url="https://access.redhat.com/security/cve/CVE-2020-8449" source="CVE"/>
        <reference ref_id="CVE-2020-8450" ref_url="https://access.redhat.com/security/cve/CVE-2020-8450" source="CVE"/>
        <description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467)

Security Fix(es):

* squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520)

* squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521)

* squid: Improper input validation in URI processor (CVE-2019-12523)

* squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524)

* squid: Heap overflow issue in URN processing (CVE-2019-12526)

* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)

* squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529)

* squid: Denial of service in cachemgr.cgi (CVE-2019-12854)

* squid: Buffer overflow in URI processor (CVE-2019-18676)

* squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677)

* squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678)

* squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679)

* squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860)

* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)

* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)

* squid: DoS in TLS handshake (CVE-2020-14058)

* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)

* squid: Improper input validation could result in a DoS (CVE-2020-24606)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-12520" impact="moderate" public="20200424">CVE-2019-12520</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2019-12521" impact="moderate" public="20200424">CVE-2019-12521</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-12523" impact="moderate" public="20191105">CVE-2019-12523</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-12524" impact="moderate" public="20200424">CVE-2019-12524</cve>
          <cve cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-12526" impact="moderate" public="20191105">CVE-2019-12526</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-12528" impact="moderate" public="20200202">CVE-2019-12528</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-12529" impact="moderate" public="20190711">CVE-2019-12529</cve>
          <cve cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-12854" impact="moderate" public="20190712">CVE-2019-12854</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-18676" impact="moderate" public="20191105">CVE-2019-18676</cve>
          <cve cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-18677" impact="moderate" public="20191105">CVE-2019-18677</cve>
          <cve cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-18678" impact="moderate" public="20191105">CVE-2019-18678</cve>
          <cve cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-18679" impact="moderate" public="20191105">CVE-2019-18679</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-20-&gt;CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-18860" impact="moderate" public="20191103">CVE-2019-18860</cve>
          <cve cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-676" href="https://access.redhat.com/security/cve/CVE-2020-14058" impact="moderate" public="20200619">CVE-2020-14058</cve>
          <cve cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-15049" impact="moderate" public="20200626">CVE-2020-15049</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-24606" impact="moderate" public="20200823">CVE-2020-24606</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-8449" impact="moderate" public="20200203">CVE-2020-8449</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8450" impact="moderate" public="20200203">CVE-2020-8450</cve>
          <bugzilla href="https://bugzilla.redhat.com/1730523" id="1730523">CVE-2019-12854 squid: Denial of service in cachemgr.cgi</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1730528" id="1730528">CVE-2019-12529 squid: Out of bounds read in Proxy-Authorization header causes DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770349" id="1770349">CVE-2019-18678 squid: HTTP Request Splitting issue in HTTP message processing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770356" id="1770356">CVE-2019-12526 squid: Heap overflow issue in URN processing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770360" id="1770360">CVE-2019-18679 squid: Information Disclosure issue in HTTP Digest Authentication</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770365" id="1770365">CVE-2019-18677 squid: Cross-Site Request Forgery issue in HTTP Request processing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770371" id="1770371">CVE-2019-12523 squid: Improper input validation in URI processor</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1770375" id="1770375">CVE-2019-18676 squid: Buffer overflow in URI processor</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798534" id="1798534">CVE-2019-12528 squid: Information Disclosure issue in FTP Gateway</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798540" id="1798540">CVE-2020-8449 squid: Improper input validation issues in HTTP Request processing</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798552" id="1798552">CVE-2020-8450 squid: Buffer overflow in reverse-proxy configurations</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1817121" id="1817121">CVE-2019-18860 squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827558" id="1827558">CVE-2019-12520 squid: Improper input validation in request allows for proxy manipulation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827562" id="1827562">CVE-2019-12521 squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1827570" id="1827570">CVE-2019-12524 squid: Improper access restriction in url_regex may lead to security bypass</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852550" id="1852550">CVE-2020-15049 squid: Request smuggling and poisoning attack against the HTTP cache</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852554" id="1852554">CVE-2020-14058 squid: DoS in TLS handshake</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1871705" id="1871705">CVE-2020-24606 squid: Improper input validation could result in a DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module squid:4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192593007"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760011"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760012"/>
              <criterion comment="libecap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+2548+24c223d9" test_ref="oval:org.almalinux.alsa:tst:201934760031"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libecap-devel is earlier than 0:1.0.1-2.module_el8.5.0+72+8ec05e37" test_ref="oval:org.almalinux.alsa:tst:201934760032"/>
              <criterion comment="libecap-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="squid is earlier than 7:4.11-3.module_el8.3.0+6184+7808b5f9" test_ref="oval:org.almalinux.alsa:tst:202047430051"/>
              <criterion comment="squid is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192593006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204751" version="636">
      <metadata>
        <title>ALSA-2020:4751: httpd:2.4 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4751" ref_url="https://errata.almalinux.org/8/ALSA-2020-4751.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4751" ref_url="https://access.redhat.com/errata/RHSA-2020:4751" source="RHSA"/>
        <reference ref_id="CVE-2018-17189" ref_url="https://access.redhat.com/security/cve/CVE-2018-17189" source="CVE"/>
        <reference ref_id="CVE-2019-0196" ref_url="https://access.redhat.com/security/cve/CVE-2019-0196" source="CVE"/>
        <reference ref_id="CVE-2019-0197" ref_url="https://access.redhat.com/security/cve/CVE-2019-0197" source="CVE"/>
        <reference ref_id="CVE-2019-10081" ref_url="https://access.redhat.com/security/cve/CVE-2019-10081" source="CVE"/>
        <reference ref_id="CVE-2019-10082" ref_url="https://access.redhat.com/security/cve/CVE-2019-10082" source="CVE"/>
        <reference ref_id="CVE-2019-10092" ref_url="https://access.redhat.com/security/cve/CVE-2019-10092" source="CVE"/>
        <reference ref_id="CVE-2019-10097" ref_url="https://access.redhat.com/security/cve/CVE-2019-10097" source="CVE"/>
        <reference ref_id="CVE-2019-10098" ref_url="https://access.redhat.com/security/cve/CVE-2019-10098" source="CVE"/>
        <reference ref_id="CVE-2020-1927" ref_url="https://access.redhat.com/security/cve/CVE-2020-1927" source="CVE"/>
        <reference ref_id="CVE-2020-1934" ref_url="https://access.redhat.com/security/cve/CVE-2020-1934" source="CVE"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)

Security Fix(es):

* httpd: memory corruption on early pushes (CVE-2019-10081)

* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)

* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)

* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)

* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)

* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)

* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)

* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)

* httpd: mod_rewrite potential open redirect (CVE-2019-10098)

* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-17189" impact="low" public="20190122">CVE-2018-17189</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2019-0196" impact="low" public="20190401">CVE-2019-0196</cve>
          <cve cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-0197" impact="low" public="20190201">CVE-2019-0197</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-10081" impact="moderate" public="20190814">CVE-2019-10081</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://access.redhat.com/security/cve/CVE-2019-10082" impact="moderate" public="20190814">CVE-2019-10082</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-10092" impact="low" public="20190814">CVE-2019-10092</cve>
          <cve cvss3="6.6/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="(CWE-120|CWE-416)" href="https://access.redhat.com/security/cve/CVE-2019-10097" impact="moderate" public="20190814">CVE-2019-10097</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://access.redhat.com/security/cve/CVE-2019-10098" impact="low" public="20190814">CVE-2019-10098</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-601" href="https://access.redhat.com/security/cve/CVE-2020-1927" impact="moderate" public="20200401">CVE-2020-1927</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-456" href="https://access.redhat.com/security/cve/CVE-2020-1934" impact="low" public="20200401">CVE-2020-1934</cve>
          <bugzilla href="https://bugzilla.redhat.com/1668497" id="1668497">CVE-2018-17189 httpd: mod_http2: DoS via slow, unneeded request bodies</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695030" id="1695030">CVE-2019-0196 httpd: mod_http2: read-after-free on a string compare</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695042" id="1695042">CVE-2019-0197 httpd: mod_http2: possible crash on late upgrade</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743956" id="1743956">CVE-2019-10092 httpd: limited cross-site scripting in mod_proxy error page</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743959" id="1743959">CVE-2019-10098 httpd: mod_rewrite potential open redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743966" id="1743966">CVE-2019-10081 httpd: memory corruption on early pushes</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743974" id="1743974">CVE-2019-10082 httpd: read-after-free in h2 connection shutdown</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1743996" id="1743996">CVE-2019-10097 httpd: null-pointer dereference in mod_remoteip</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820761" id="1820761">CVE-2020-1927 httpd: mod_rewrite configurations vulnerable to open redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1820772" id="1820772">CVE-2020-1934 httpd: mod_proxy_ftp use of uninitialized value</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module httpd:2.4 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190980023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="httpd is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510011"/>
              <criterion comment="httpd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510012"/>
              <criterion comment="httpd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510031"/>
              <criterion comment="httpd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-devel is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510032"/>
              <criterion comment="httpd-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510051"/>
              <criterion comment="httpd-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-filesystem is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510052"/>
              <criterion comment="httpd-filesystem is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510071"/>
              <criterion comment="httpd-manual is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-manual is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510072"/>
              <criterion comment="httpd-manual is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510091"/>
              <criterion comment="httpd-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="httpd-tools is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510092"/>
              <criterion comment="httpd-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is earlier than 0:1.15.7-2.module_el8.3.0+2016+8bf57d29" test_ref="oval:org.almalinux.alsa:tst:202047510111"/>
              <criterion comment="mod_http2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_http2 is earlier than 0:1.15.7-2.module_el8.3.0+477+498bb568" test_ref="oval:org.almalinux.alsa:tst:202047510112"/>
              <criterion comment="mod_http2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510131"/>
              <criterion comment="mod_ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ldap is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510132"/>
              <criterion comment="mod_ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is earlier than 1:2.0.8-8.module_el8.5.0+2609+b30d9eec" test_ref="oval:org.almalinux.alsa:tst:202047510151"/>
              <criterion comment="mod_md is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_md is earlier than 1:2.0.8-8.module_el8.5.0+230+b2ab8c5d" test_ref="oval:org.almalinux.alsa:tst:202047510152"/>
              <criterion comment="mod_md is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510171"/>
              <criterion comment="mod_proxy_html is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_proxy_html is earlier than 1:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510172"/>
              <criterion comment="mod_proxy_html is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is earlier than 0:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510191"/>
              <criterion comment="mod_session is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_session is earlier than 0:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510192"/>
              <criterion comment="mod_session is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is earlier than 1:2.4.37-30.module_el8.3.0+2171+8bf57d29.alma.1" test_ref="oval:org.almalinux.alsa:tst:202047510211"/>
              <criterion comment="mod_ssl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190980022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_ssl is earlier than 1:2.4.37-30.module_el8.3.0+561+97fdbbcc" test_ref="oval:org.almalinux.alsa:tst:202047510212"/>
              <criterion comment="mod_ssl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909800222"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204756" version="636">
      <metadata>
        <title>ALSA-2020:4756: varnish:6 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4756" ref_url="https://errata.almalinux.org/8/ALSA-2020-4756.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4756" ref_url="https://access.redhat.com/errata/RHSA-2020:4756" source="RHSA"/>
        <reference ref_id="CVE-2019-15892" ref_url="https://access.redhat.com/security/cve/CVE-2019-15892" source="CVE"/>
        <reference ref_id="CVE-2019-20637" ref_url="https://access.redhat.com/security/cve/CVE-2019-20637" source="CVE"/>
        <reference ref_id="CVE-2020-11653" ref_url="https://access.redhat.com/security/cve/CVE-2020-11653" source="CVE"/>
        <description>Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

The following packages have been upgraded to a later upstream version: varnish (6.0.6). (BZ#1795673)

Security Fix(es):

* varnish: denial of service handling certain crafted HTTP/1 requests (CVE-2019-15892)

* varnish: remote clients may cause Varnish to assert and restart which could result in DoS (CVE-2020-11653)

* varnish: not clearing pointer between two client requests leads to information disclosure (CVE-2019-20637)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2019-15892" impact="moderate" public="20190903">CVE-2019-15892</cve>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2019-20637" impact="low" public="20191021">CVE-2019-20637</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-11653" impact="moderate" public="20200204">CVE-2020-11653</cve>
          <bugzilla href="https://bugzilla.redhat.com/1756079" id="1756079">CVE-2019-15892 varnish: denial of service handling certain crafted HTTP/1 requests</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1772362" id="1772362">CVE-2019-20637 varnish: not clearing pointer between two client requests leads to information disclosure</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1813867" id="1813867">CVE-2020-11653 varnish: remote clients may cause Varnish to assert and restart which could result in DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module varnish:6 is enabled" test_ref="oval:org.almalinux.alsa:tst:20204756009"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="varnish is earlier than 0:6.0.6-2.module_el8.4.0+2514+e762eaa1.1" test_ref="oval:org.almalinux.alsa:tst:202047560011"/>
              <criterion comment="varnish is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204756002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish is earlier than 0:6.0.6-2.module_el8.4.0+873+3086ea3b.1" test_ref="oval:org.almalinux.alsa:tst:202047560012"/>
              <criterion comment="varnish is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202047560022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-devel is earlier than 0:6.0.6-2.module_el8.4.0+2514+e762eaa1.1" test_ref="oval:org.almalinux.alsa:tst:202047560031"/>
              <criterion comment="varnish-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204756004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-devel is earlier than 0:6.0.6-2.module_el8.4.0+873+3086ea3b.1" test_ref="oval:org.almalinux.alsa:tst:202047560032"/>
              <criterion comment="varnish-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202047560042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-docs is earlier than 0:6.0.6-2.module_el8.4.0+2514+e762eaa1.1" test_ref="oval:org.almalinux.alsa:tst:202047560051"/>
              <criterion comment="varnish-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204756006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-docs is earlier than 0:6.0.6-2.module_el8.4.0+873+3086ea3b.1" test_ref="oval:org.almalinux.alsa:tst:202047560052"/>
              <criterion comment="varnish-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202047560062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-modules is earlier than 0:0.15.0-5.module_el8.3.0+6171+b3b42fcc" test_ref="oval:org.almalinux.alsa:tst:202047560071"/>
              <criterion comment="varnish-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204756008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-modules is earlier than 0:0.15.0-5.module_el8.4.0+2256+b3b42fcc" test_ref="oval:org.almalinux.alsa:tst:202047560072"/>
              <criterion comment="varnish-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204756008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="varnish-modules is earlier than 0:0.15.0-5.module_el8.3.0+399+10bd7ebd" test_ref="oval:org.almalinux.alsa:tst:202047560073"/>
              <criterion comment="varnish-modules is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202047560082"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204760" version="637">
      <metadata>
        <title>ALSA-2020:4760: tcpdump security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4760" ref_url="https://errata.almalinux.org/8/ALSA-2020-4760.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4760" ref_url="https://access.redhat.com/errata/RHSA-2020:4760" source="RHSA"/>
        <reference ref_id="CVE-2018-10103" ref_url="https://access.redhat.com/security/cve/CVE-2018-10103" source="CVE"/>
        <reference ref_id="CVE-2018-10105" ref_url="https://access.redhat.com/security/cve/CVE-2018-10105" source="CVE"/>
        <reference ref_id="CVE-2018-14461" ref_url="https://access.redhat.com/security/cve/CVE-2018-14461" source="CVE"/>
        <reference ref_id="CVE-2018-14462" ref_url="https://access.redhat.com/security/cve/CVE-2018-14462" source="CVE"/>
        <reference ref_id="CVE-2018-14463" ref_url="https://access.redhat.com/security/cve/CVE-2018-14463" source="CVE"/>
        <reference ref_id="CVE-2018-14464" ref_url="https://access.redhat.com/security/cve/CVE-2018-14464" source="CVE"/>
        <reference ref_id="CVE-2018-14465" ref_url="https://access.redhat.com/security/cve/CVE-2018-14465" source="CVE"/>
        <reference ref_id="CVE-2018-14466" ref_url="https://access.redhat.com/security/cve/CVE-2018-14466" source="CVE"/>
        <reference ref_id="CVE-2018-14467" ref_url="https://access.redhat.com/security/cve/CVE-2018-14467" source="CVE"/>
        <reference ref_id="CVE-2018-14468" ref_url="https://access.redhat.com/security/cve/CVE-2018-14468" source="CVE"/>
        <reference ref_id="CVE-2018-14469" ref_url="https://access.redhat.com/security/cve/CVE-2018-14469" source="CVE"/>
        <reference ref_id="CVE-2018-14470" ref_url="https://access.redhat.com/security/cve/CVE-2018-14470" source="CVE"/>
        <reference ref_id="CVE-2018-14879" ref_url="https://access.redhat.com/security/cve/CVE-2018-14879" source="CVE"/>
        <reference ref_id="CVE-2018-14880" ref_url="https://access.redhat.com/security/cve/CVE-2018-14880" source="CVE"/>
        <reference ref_id="CVE-2018-14881" ref_url="https://access.redhat.com/security/cve/CVE-2018-14881" source="CVE"/>
        <reference ref_id="CVE-2018-14882" ref_url="https://access.redhat.com/security/cve/CVE-2018-14882" source="CVE"/>
        <reference ref_id="CVE-2018-16227" ref_url="https://access.redhat.com/security/cve/CVE-2018-16227" source="CVE"/>
        <reference ref_id="CVE-2018-16228" ref_url="https://access.redhat.com/security/cve/CVE-2018-16228" source="CVE"/>
        <reference ref_id="CVE-2018-16229" ref_url="https://access.redhat.com/security/cve/CVE-2018-16229" source="CVE"/>
        <reference ref_id="CVE-2018-16230" ref_url="https://access.redhat.com/security/cve/CVE-2018-16230" source="CVE"/>
        <reference ref_id="CVE-2018-16300" ref_url="https://access.redhat.com/security/cve/CVE-2018-16300" source="CVE"/>
        <reference ref_id="CVE-2018-16451" ref_url="https://access.redhat.com/security/cve/CVE-2018-16451" source="CVE"/>
        <reference ref_id="CVE-2018-16452" ref_url="https://access.redhat.com/security/cve/CVE-2018-16452" source="CVE"/>
        <reference ref_id="CVE-2019-15166" ref_url="https://access.redhat.com/security/cve/CVE-2019-15166" source="CVE"/>
        <description>The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces.

The following packages have been upgraded to a later upstream version: tcpdump (4.9.3). (BZ#1804063)

Security Fix(es):

* tcpdump: SMB data printing mishandled (CVE-2018-10103)

* tcpdump: SMB data printing mishandled (CVE-2018-10105)

* tcpdump: Out of bounds read/write in get_next_file() in tcpdump.c (CVE-2018-14879)

* tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c (CVE-2018-14461)

* tcpdump: Buffer over-read in icmp_print() function in print-icmp.c (CVE-2018-14462)

* tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c (CVE-2018-14463)

* tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c (CVE-2018-14464)

* tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c (CVE-2018-14465)

* tcpdump: Buffer over-read in print-icmp6.c (CVE-2018-14466)

* tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c (CVE-2018-14467)

* tcpdump: Buffer over-read in mfr_print() function in print-fr.c (CVE-2018-14468)

* tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c (CVE-2018-14469)

* tcpdump: Buffer over-read in babel_print_v2() in print-babel.c (CVE-2018-14470)

* tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c (CVE-2018-14880)

* tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c (CVE-2018-14881)

* tcpdump: Buffer over-read in function rpl_dio_printopt in print-icmp6.c (CVE-2018-14882)

* tcpdump: Buffer over-read in print-802_11.c (CVE-2018-16227)

* tcpdump: Access to uninitialized buffer in print_prefix() function in print-hncp.c (CVE-2018-16228)

* tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c (CVE-2018-16229)

* tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c (CVE-2018-16230)

* tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c (CVE-2018-16300)

* tcpdump: Buffer over-read in print_trans() function in print-smb.c (CVE-2018-16451)

* tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c (CVE-2018-16452)

* tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c (CVE-2019-15166)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-10103" impact="moderate" public="20191002">CVE-2018-10103</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-10105" impact="moderate" public="20191002">CVE-2018-10105</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14461" impact="low" public="20191002">CVE-2018-14461</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14462" impact="low" public="20191002">CVE-2018-14462</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14463" impact="low" public="20191002">CVE-2018-14463</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14464" impact="low" public="20191002">CVE-2018-14464</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14465" impact="low" public="20191002">CVE-2018-14465</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14466" impact="low" public="20191002">CVE-2018-14466</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14467" impact="low" public="20191002">CVE-2018-14467</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14468" impact="low" public="20191002">CVE-2018-14468</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14469" impact="low" public="20191002">CVE-2018-14469</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14470" impact="low" public="20191002">CVE-2018-14470</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2018-14879" impact="moderate" public="20191002">CVE-2018-14879</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14880" impact="low" public="20191002">CVE-2018-14880</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14881" impact="low" public="20191002">CVE-2018-14881</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-14882" impact="low" public="20191002">CVE-2018-14882</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-16227" impact="low" public="20191002">CVE-2018-16227</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-665" href="https://access.redhat.com/security/cve/CVE-2018-16228" impact="low" public="20191002">CVE-2018-16228</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-16229" impact="low" public="20191002">CVE-2018-16229</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-16230" impact="low" public="20191002">CVE-2018-16230</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-16300" impact="low" public="20191002">CVE-2018-16300</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2018-16451" impact="low" public="20191002">CVE-2018-16451</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-16452" impact="low" public="20191002">CVE-2018-16452</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2019-15166" impact="low" public="20191002">CVE-2019-15166</cve>
          <bugzilla href="https://bugzilla.redhat.com/1760430" id="1760430">CVE-2018-14882 tcpdump: Buffer over-read in function rpl_dio_printopt in print-icmp6.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760445" id="1760445">CVE-2018-16300 tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760447" id="1760447">CVE-2018-14469 tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760449" id="1760449">CVE-2018-14465 tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760453" id="1760453">CVE-2018-14463 tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760455" id="1760455">CVE-2018-14462 tcpdump: Buffer over-read in icmp_print() function in print-icmp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760457" id="1760457">CVE-2018-14879 tcpdump: Out of bounds read/write in in get_next_file() in tcpdump.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760458" id="1760458">CVE-2018-16229 tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760461" id="1760461">CVE-2018-16227 tcpdump: Buffer over-read in print-802_11.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760463" id="1760463">CVE-2018-14881 tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760464" id="1760464">CVE-2018-14468 tcpdump: Buffer over-read in mfr_print() function in print-fr.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760468" id="1760468">CVE-2018-14880 tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760504" id="1760504">CVE-2018-10103 tcpdump: SMB data printing mishandled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760505" id="1760505">CVE-2018-10105 tcpdump: SMB data printing mishandled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760506" id="1760506">CVE-2018-14461 tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760507" id="1760507">CVE-2018-14464 tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760509" id="1760509">CVE-2018-14466 tcpdump: Buffer over-read in print-icmp6.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760512" id="1760512">CVE-2018-14467 tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760513" id="1760513">CVE-2018-14470 tcpdump: Buffer over-read in babel_print_v2() in print-babel.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760514" id="1760514">CVE-2018-16228 tcpdump: Access to uninitialized buffer in print_prefix() function in print-hncp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760516" id="1760516">CVE-2018-16230 tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760517" id="1760517">CVE-2018-16451 tcpdump: Buffer over-read in print_trans() function in print-smb.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760518" id="1760518">CVE-2018-16452 tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1760520" id="1760520">CVE-2019-15166 tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="tcpdump is earlier than 14:4.9.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204760001"/>
          <criterion comment="tcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201604002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204763" version="636">
      <metadata>
        <title>ALSA-2020:4763: dovecot security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4763" ref_url="https://errata.almalinux.org/8/ALSA-2020-4763.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4763" ref_url="https://access.redhat.com/errata/RHSA-2020:4763" source="RHSA"/>
        <reference ref_id="CVE-2020-10958" ref_url="https://access.redhat.com/security/cve/CVE-2020-10958" source="CVE"/>
        <reference ref_id="CVE-2020-10967" ref_url="https://access.redhat.com/security/cve/CVE-2020-10967" source="CVE"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: command followed by sufficient number of newlines leads to use-after-free (CVE-2020-10958)

* dovecot: sending mail with empty quoted localpart leads to DoS (CVE-2020-10967)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-10958" impact="moderate" public="20200518">CVE-2020-10958</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-10967" impact="moderate" public="20200518">CVE-2020-10967</cve>
          <bugzilla href="https://bugzilla.redhat.com/1834323" id="1834323">CVE-2020-10958 dovecot: command followed by sufficient number of newlines leads to use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1834326" id="1834326">CVE-2020-10967 dovecot: sending mail with empty quoted localpart leads to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dovecot is earlier than 1:2.3.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204763001"/>
              <criterion comment="dovecot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-devel is earlier than 1:2.3.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204763003"/>
              <criterion comment="dovecot-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-mysql is earlier than 1:2.3.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204763005"/>
              <criterion comment="dovecot-mysql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pgsql is earlier than 1:2.3.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204763007"/>
              <criterion comment="dovecot-pgsql is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20192822008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dovecot-pigeonhole is earlier than 1:2.3.8-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204763009"/>
              <criterion comment="dovecot-pigeonhole is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193467010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204766" version="636">
      <metadata>
        <title>ALSA-2020:4766: libexif security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4766" ref_url="https://errata.almalinux.org/8/ALSA-2020-4766.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4766" ref_url="https://access.redhat.com/errata/RHSA-2020:4766" source="RHSA"/>
        <reference ref_id="CVE-2019-9278" ref_url="https://access.redhat.com/security/cve/CVE-2019-9278" source="CVE"/>
        <reference ref_id="CVE-2020-0093" ref_url="https://access.redhat.com/security/cve/CVE-2020-0093" source="CVE"/>
        <reference ref_id="CVE-2020-0181" ref_url="https://access.redhat.com/security/cve/CVE-2020-0181" source="CVE"/>
        <reference ref_id="CVE-2020-0182" ref_url="https://access.redhat.com/security/cve/CVE-2020-0182" source="CVE"/>
        <reference ref_id="CVE-2020-0198" ref_url="https://access.redhat.com/security/cve/CVE-2020-0198" source="CVE"/>
        <reference ref_id="CVE-2020-12767" ref_url="https://access.redhat.com/security/cve/CVE-2020-12767" source="CVE"/>
        <reference ref_id="CVE-2020-13113" ref_url="https://access.redhat.com/security/cve/CVE-2020-13113" source="CVE"/>
        <reference ref_id="CVE-2020-13114" ref_url="https://access.redhat.com/security/cve/CVE-2020-13114" source="CVE"/>
        <description>The libexif packages provide a library for extracting extra information from image files.

The following packages have been upgraded to a later upstream version: libexif (0.6.22). (BZ#1841320)

Security Fix(es):

* libexif: out of bounds write in exif-data.c (CVE-2019-9278)

* libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c (CVE-2020-0093)

* libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c (CVE-2020-0181)

* libexif: integer overflow in exif_data_load_data_content function in exif-data.c (CVE-2020-0198)

* libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free (CVE-2020-13113)

* libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time (CVE-2020-13114)

* libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c (CVE-2020-0182)

* libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c (CVE-2020-12767)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2019-9278" impact="moderate" public="20191201">CVE-2019-9278</cve>
          <cve cvss3="5.0/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-805-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-0093" impact="moderate" public="20200504">CVE-2020-0093</cve>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-190-&gt;CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-0181" impact="moderate" public="20200601">CVE-2020-0181</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-0182" impact="low" public="20200601">CVE-2020-0182</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190-&gt;CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-0198" impact="moderate" public="20200601">CVE-2020-0198</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-369" href="https://access.redhat.com/security/cve/CVE-2020-12767" impact="low" public="20200217">CVE-2020-12767</cve>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-456-&gt;(CWE-416|CWE-822)" href="https://access.redhat.com/security/cve/CVE-2020-13113" impact="moderate" public="20200516">CVE-2020-13113</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-13114" impact="moderate" public="20200516">CVE-2020-13114</cve>
          <bugzilla href="https://bugzilla.redhat.com/1789031" id="1789031">CVE-2019-9278 libexif: out of bounds write in exif-data.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1834950" id="1834950">CVE-2020-12767 libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1840347" id="1840347">CVE-2020-13113 libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1840350" id="1840350">CVE-2020-13114 libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1847131" id="1847131">CVE-2020-0181 libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1847133" id="1847133">CVE-2020-0198 libexif: integer overflow in exif_data_load_data_content function in exif-data.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852487" id="1852487">CVE-2020-0093 libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1852490" id="1852490">CVE-2020-0182 libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libexif is earlier than 0:0.6.22-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204766001"/>
              <criterion comment="libexif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libexif-devel is earlier than 0:0.6.22-4.el8" test_ref="oval:org.almalinux.alsa:tst:20204766003"/>
              <criterion comment="libexif-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204799" version="636">
      <metadata>
        <title>ALSA-2020:4799: freeradius:3.0 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4799" ref_url="https://errata.almalinux.org/8/ALSA-2020-4799.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4799" ref_url="https://access.redhat.com/errata/RHSA-2020:4799" source="RHSA"/>
        <reference ref_id="CVE-2019-17185" ref_url="https://access.redhat.com/security/cve/CVE-2019-17185" source="CVE"/>
        <description>FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-567" href="https://access.redhat.com/security/cve/CVE-2019-17185" impact="moderate" public="20191114">CVE-2019-17185</cve>
          <bugzilla href="https://bugzilla.redhat.com/1816680" id="1816680">CVE-2019-17185 freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module freeradius:3.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191142025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990011"/>
              <criterion comment="freeradius is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990012"/>
              <criterion comment="freeradius is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990013"/>
              <criterion comment="freeradius is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990031"/>
              <criterion comment="freeradius-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990032"/>
              <criterion comment="freeradius-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-devel is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990033"/>
              <criterion comment="freeradius-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990051"/>
              <criterion comment="freeradius-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990052"/>
              <criterion comment="freeradius-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-doc is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990053"/>
              <criterion comment="freeradius-doc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990071"/>
              <criterion comment="freeradius-krb5 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990072"/>
              <criterion comment="freeradius-krb5 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-krb5 is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990073"/>
              <criterion comment="freeradius-krb5 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990091"/>
              <criterion comment="freeradius-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990092"/>
              <criterion comment="freeradius-ldap is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-ldap is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990093"/>
              <criterion comment="freeradius-ldap is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990111"/>
              <criterion comment="freeradius-mysql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990112"/>
              <criterion comment="freeradius-mysql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-mysql is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990113"/>
              <criterion comment="freeradius-mysql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990131"/>
              <criterion comment="freeradius-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990132"/>
              <criterion comment="freeradius-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-perl is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990133"/>
              <criterion comment="freeradius-perl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990151"/>
              <criterion comment="freeradius-postgresql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990152"/>
              <criterion comment="freeradius-postgresql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-postgresql is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990153"/>
              <criterion comment="freeradius-postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990171"/>
              <criterion comment="freeradius-rest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990172"/>
              <criterion comment="freeradius-rest is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-rest is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990173"/>
              <criterion comment="freeradius-rest is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990191"/>
              <criterion comment="freeradius-sqlite is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990192"/>
              <criterion comment="freeradius-sqlite is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-sqlite is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990193"/>
              <criterion comment="freeradius-sqlite is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990211"/>
              <criterion comment="freeradius-unixODBC is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990212"/>
              <criterion comment="freeradius-unixODBC is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-unixODBC is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990213"/>
              <criterion comment="freeradius-unixODBC is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990231"/>
              <criterion comment="freeradius-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990232"/>
              <criterion comment="freeradius-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191142024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freeradius-utils is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990233"/>
              <criterion comment="freeradius-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911420242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-freeradius is earlier than 0:3.0.20-3.module_el8.3.0+2067+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990251"/>
              <criterion comment="python3-freeradius is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204799026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-freeradius is earlier than 0:3.0.20-3.module_el8.4.0+2207+67902674" test_ref="oval:org.almalinux.alsa:tst:202047990252"/>
              <criterion comment="python3-freeradius is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204799026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-freeradius is earlier than 0:3.0.20-3.module_el8.3.0+476+0982bc20" test_ref="oval:org.almalinux.alsa:tst:202047990253"/>
              <criterion comment="python3-freeradius is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202047990262"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204805" version="637">
      <metadata>
        <title>ALSA-2020:4805: edk2 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4805" ref_url="https://errata.almalinux.org/8/ALSA-2020-4805.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4805" ref_url="https://access.redhat.com/errata/RHSA-2020:4805" source="RHSA"/>
        <reference ref_id="CVE-2019-14559" ref_url="https://access.redhat.com/security/cve/CVE-2019-14559" source="CVE"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* edk2: memory leak in ArpOnFrameRcvdDpc (CVE-2019-14559)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-14559" impact="moderate" public="20200205">CVE-2019-14559</cve>
          <bugzilla href="https://bugzilla.redhat.com/1758601" id="1758601">CVE-2019-14559 edk2: memory leak in ArpOnFrameRcvdDpc</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="edk2-aarch64 is earlier than 0:20200602gitca407c7246bf-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204805001"/>
              <criterion comment="edk2-aarch64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="edk2-ovmf is earlier than 0:20200602gitca407c7246bf-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204805003"/>
              <criterion comment="edk2-ovmf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190968004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204806" version="635">
      <metadata>
        <title>ALSA-2020:4806: dpdk security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4806" ref_url="https://errata.almalinux.org/8/ALSA-2020-4806.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4806" ref_url="https://access.redhat.com/errata/RHSA-2020:4806" source="RHSA"/>
        <reference ref_id="CVE-2020-10722" ref_url="https://access.redhat.com/security/cve/CVE-2020-10722" source="CVE"/>
        <reference ref_id="CVE-2020-10723" ref_url="https://access.redhat.com/security/cve/CVE-2020-10723" source="CVE"/>
        <reference ref_id="CVE-2020-10725" ref_url="https://access.redhat.com/security/cve/CVE-2020-10725" source="CVE"/>
        <reference ref_id="CVE-2020-10726" ref_url="https://access.redhat.com/security/cve/CVE-2020-10726" source="CVE"/>
        <description>The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.

The following packages have been upgraded to a later upstream version: dpdk (19.11.3). (BZ#1824905)

Security Fix(es):

* dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor (CVE-2020-10725)

* dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() (CVE-2020-10722)

* dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() (CVE-2020-10723)

* dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS (CVE-2020-10726)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-10722" impact="moderate" public="20200518">CVE-2020-10722</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-10723" impact="moderate" public="20200518">CVE-2020-10723</cve>
          <cve cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-665" href="https://access.redhat.com/security/cve/CVE-2020-10725" impact="important" public="20200518">CVE-2020-10725</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-10726" impact="moderate" public="20200518">CVE-2020-10726</cve>
          <bugzilla href="https://bugzilla.redhat.com/1828867" id="1828867">CVE-2020-10722 dpdk: librte_vhost Integer overflow in vhost_user_set_log_base()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828874" id="1828874">CVE-2020-10723 dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828894" id="1828894">CVE-2020-10725 dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828898" id="1828898">CVE-2020-10726 dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dpdk is earlier than 0:19.11.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204806001"/>
              <criterion comment="dpdk is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-devel is earlier than 0:19.11.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204806003"/>
              <criterion comment="dpdk-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-doc is earlier than 0:19.11.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204806005"/>
              <criterion comment="dpdk-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dpdk-tools is earlier than 0:19.11.3-1.el8" test_ref="oval:org.almalinux.alsa:tst:20204806007"/>
              <criterion comment="dpdk-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201735008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204807" version="635">
      <metadata>
        <title>ALSA-2020:4807: prometheus-jmx-exporter security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4807" ref_url="https://errata.almalinux.org/8/ALSA-2020-4807.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4807" ref_url="https://access.redhat.com/errata/RHSA-2020:4807" source="RHSA"/>
        <reference ref_id="CVE-2017-18640" ref_url="https://access.redhat.com/security/cve/CVE-2017-18640" source="CVE"/>
        <description>Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target.

Security Fix(es):

* snakeyaml: Billion laughs attack via alias feature (CVE-2017-18640)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cwe="CWE-776-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2017-18640" impact="moderate" public="20191212">CVE-2017-18640</cve>
          <bugzilla href="https://bugzilla.redhat.com/1785376" id="1785376">CVE-2017-18640 snakeyaml: Billion laughs attack via alias feature</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="prometheus-jmx-exporter is earlier than 0:0.12.0-6.el8" test_ref="oval:org.almalinux.alsa:tst:20204807001"/>
          <criterion comment="prometheus-jmx-exporter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204807002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204820" version="635">
      <metadata>
        <title>ALSA-2020:4820: file-roller security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4820" ref_url="https://errata.almalinux.org/8/ALSA-2020-4820.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4820" ref_url="https://access.redhat.com/errata/RHSA-2020:4820" source="RHSA"/>
        <reference ref_id="CVE-2019-16680" ref_url="https://access.redhat.com/security/cve/CVE-2019-16680" source="CVE"/>
        <reference ref_id="CVE-2020-11736" ref_url="https://access.redhat.com/security/cve/CVE-2020-11736" source="CVE"/>
        <description>File Roller is an application for creating and viewing archives files, such as tar or zip files.

Security Fix(es):

* file-roller: path traversal vulnerability via a specially crafted filename contained in malicious archive (CVE-2019-16680)

* file-roller: directory traversal via directory symlink pointing outside of the target directory (CVE-2020-11736)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2019-16680" impact="moderate" public="20180314">CVE-2019-16680</cve>
          <cve cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" cwe="CWE-22" href="https://access.redhat.com/security/cve/CVE-2020-11736" impact="low" public="20200412">CVE-2020-11736</cve>
          <bugzilla href="https://bugzilla.redhat.com/1767594" id="1767594">CVE-2019-16680 file-roller: path traversal vulnerability via a specially crafted filename contained in malicious archive</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1824985" id="1824985">CVE-2020-11736 file-roller: directory traversal via directory symlink pointing outside of the target directory</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="file-roller is earlier than 0:3.28.1-3.el8" test_ref="oval:org.almalinux.alsa:tst:20204820001"/>
          <criterion comment="file-roller is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193553010"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204827" version="635">
      <metadata>
        <title>ALSA-2020:4827: oniguruma security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4827" ref_url="https://errata.almalinux.org/8/ALSA-2020-4827.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4827" ref_url="https://access.redhat.com/errata/RHSA-2020:4827" source="RHSA"/>
        <reference ref_id="CVE-2019-13225" ref_url="https://access.redhat.com/security/cve/CVE-2019-13225" source="CVE"/>
        <description>Oniguruma is a regular expressions library that supports a variety of character encodings. 

Security Fix(es):

* oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476-&gt;CWE-400" href="https://access.redhat.com/security/cve/CVE-2019-13225" impact="moderate" public="20190627">CVE-2019-13225</cve>
          <bugzilla href="https://bugzilla.redhat.com/1728965" id="1728965">CVE-2019-13225 oniguruma: NULL pointer dereference in match_at() in regexec.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="oniguruma is earlier than 0:6.8.2-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204827001"/>
              <criterion comment="oniguruma is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204827002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oniguruma-devel is earlier than 0:6.8.2-2.el8" test_ref="oval:org.almalinux.alsa:tst:20204827003"/>
              <criterion comment="oniguruma-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204827004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204844" version="636">
      <metadata>
        <title>ALSA-2020:4844: fontforge security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4844" ref_url="https://errata.almalinux.org/8/ALSA-2020-4844.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4844" ref_url="https://access.redhat.com/errata/RHSA-2020:4844" source="RHSA"/>
        <reference ref_id="CVE-2020-25690" ref_url="https://access.redhat.com/security/cve/CVE-2020-25690" source="CVE"/>
        <description>FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts. 

Security Fix(es):

* fontforge: SFD_GetFontMetaData() insufficient CVE-2020-5395 backport (CVE-2020-25690)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-25690" impact="moderate" public="20200121">CVE-2020-25690</cve>
          <bugzilla href="https://bugzilla.redhat.com/1893188" id="1893188">CVE-2020-25690 fontforge: SFD_GetFontMetaData() insufficient CVE-2020-5395 backport</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="fontforge is earlier than 0:20170731-15.el8" test_ref="oval:org.almalinux.alsa:tst:20204844001"/>
          <criterion comment="fontforge is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201921002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204846" version="638">
      <metadata>
        <title>ALSA-2020:4846: mingw-expat security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4846" ref_url="https://errata.almalinux.org/8/ALSA-2020-4846.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4846" ref_url="https://access.redhat.com/errata/RHSA-2020:4846" source="RHSA"/>
        <reference ref_id="CVE-2018-20843" ref_url="https://access.redhat.com/security/cve/CVE-2018-20843" source="CVE"/>
        <description>Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW. 

Security Fix(es):

* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2018-20843" impact="moderate" public="20190624">CVE-2018-20843</cve>
          <bugzilla href="https://bugzilla.redhat.com/1723723" id="1723723">CVE-2018-20843 expat: large number of colons in input makes parser consume high amount of resources, leading to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mingw32-expat is earlier than 0:2.2.4-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204846001"/>
              <criterion comment="mingw32-expat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204846002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mingw64-expat is earlier than 0:2.2.4-5.el8" test_ref="oval:org.almalinux.alsa:tst:20204846003"/>
              <criterion comment="mingw64-expat is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204846004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204847" version="636">
      <metadata>
        <title>ALSA-2020:4847: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4847" ref_url="https://errata.almalinux.org/8/ALSA-2020-4847.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4847" ref_url="https://access.redhat.com/errata/RHSA-2020:4847" source="RHSA"/>
        <reference ref_id="CVE-2015-9251" ref_url="https://access.redhat.com/security/cve/CVE-2015-9251" source="CVE"/>
        <reference ref_id="CVE-2016-10735" ref_url="https://access.redhat.com/security/cve/CVE-2016-10735" source="CVE"/>
        <reference ref_id="CVE-2018-14040" ref_url="https://access.redhat.com/security/cve/CVE-2018-14040" source="CVE"/>
        <reference ref_id="CVE-2018-14042" ref_url="https://access.redhat.com/security/cve/CVE-2018-14042" source="CVE"/>
        <reference ref_id="CVE-2019-10146" ref_url="https://access.redhat.com/security/cve/CVE-2019-10146" source="CVE"/>
        <reference ref_id="CVE-2019-10179" ref_url="https://access.redhat.com/security/cve/CVE-2019-10179" source="CVE"/>
        <reference ref_id="CVE-2019-10221" ref_url="https://access.redhat.com/security/cve/CVE-2019-10221" source="CVE"/>
        <reference ref_id="CVE-2019-11358" ref_url="https://access.redhat.com/security/cve/CVE-2019-11358" source="CVE"/>
        <reference ref_id="CVE-2019-8331" ref_url="https://access.redhat.com/security/cve/CVE-2019-8331" source="CVE"/>
        <reference ref_id="CVE-2020-11022" ref_url="https://access.redhat.com/security/cve/CVE-2020-11022" source="CVE"/>
        <reference ref_id="CVE-2020-11023" ref_url="https://access.redhat.com/security/cve/CVE-2020-11023" source="CVE"/>
        <reference ref_id="CVE-2020-15720" ref_url="https://access.redhat.com/security/cve/CVE-2020-15720" source="CVE"/>
        <reference ref_id="CVE-2020-1721" ref_url="https://access.redhat.com/security/cve/CVE-2020-1721" source="CVE"/>
        <reference ref_id="CVE-2020-1935" ref_url="https://access.redhat.com/security/cve/CVE-2020-1935" source="CVE"/>
        <reference ref_id="CVE-2020-25715" ref_url="https://access.redhat.com/security/cve/CVE-2020-25715" source="CVE"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.

Security Fix(es):

* jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)

* bootstrap: XSS in the data-target attribute (CVE-2016-10735)

* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)

* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)

* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)

* jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)

* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)

* jquery: Passing HTML containing &lt;option&gt; elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)

* pki: Dogtag's python client does not validate certificates (CVE-2020-15720)

* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)

* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)

* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)

* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2015-9251" impact="moderate" public="20150627">CVE-2015-9251</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2016-10735" impact="moderate" public="20160627">CVE-2016-10735</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-14040" impact="moderate" public="20180529">CVE-2018-14040</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2018-14042" impact="moderate" public="20180529">CVE-2018-14042</cve>
          <cve cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-10146" impact="low" public="20200203">CVE-2019-10146</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-10179" impact="low" public="20200203">CVE-2019-10179</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-10221" impact="low" public="20200203">CVE-2019-10221</cve>
          <cve cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-11358" impact="moderate" public="20190327">CVE-2019-11358</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2019-8331" impact="moderate" public="20190211">CVE-2019-8331</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-11022" impact="moderate" public="20200423">CVE-2020-11022</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-11023" impact="moderate" public="20200429">CVE-2020-11023</cve>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2020-15720" impact="moderate" public="20200623">CVE-2020-15720</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-1721" impact="low" public="20200203">CVE-2020-1721</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-1935" impact="low" public="20200224">CVE-2020-1935</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-25715" impact="moderate" public="20210302">CVE-2020-25715</cve>
          <bugzilla href="https://bugzilla.redhat.com/1399546" id="1399546">CVE-2015-9251 jquery: Cross-site scripting via cross-domain ajax requests</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1601614" id="1601614">CVE-2018-14040 bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1601617" id="1601617">CVE-2018-14042 bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1668097" id="1668097">CVE-2016-10735 bootstrap: XSS in the data-target attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1686454" id="1686454">CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1695901" id="1695901">CVE-2019-10179 pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1701972" id="1701972">CVE-2019-11358 jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1710171" id="1710171">CVE-2019-10146 pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1732565" id="1732565">CVE-2019-10221 pki-core: Reflected XSS in getcookies?url= endpoint in CA</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1777579" id="1777579">CVE-2020-1721 pki-core: KRA vulnerable to reflected XSS via the getPk12 page</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1806835" id="1806835">CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1828406" id="1828406">CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1850004" id="1850004">CVE-2020-11023 jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1855273" id="1855273">CVE-2020-15720 pki: Dogtag's python client does not validate certificates</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891016" id="1891016">CVE-2020-25715 pki-core: XSS in the certificate search results</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module pki-deps:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416067"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160011"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-collections is earlier than 0:3.2.2-10.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160012"/>
                  <criterion comment="apache-commons-collections is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416002"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160031"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-lang is earlier than 0:2.6-21.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160032"/>
                  <criterion comment="apache-commons-lang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416004"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-net is earlier than 0:3.6-3.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202048470051"/>
                  <criterion comment="apache-commons-net is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204847006"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="apache-commons-net is earlier than 0:3.6-3.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202048470052"/>
                  <criterion comment="apache-commons-net is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204847006"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160051"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="bea-stax-api is earlier than 0:1.2.0-16.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160052"/>
                  <criterion comment="bea-stax-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416006"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160071"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-fastinfoset is earlier than 0:1.2.13-9.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160072"/>
                  <criterion comment="glassfish-fastinfoset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416008"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160091"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-api is earlier than 0:2.2.12-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160092"/>
                  <criterion comment="glassfish-jaxb-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416010"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160111"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-core is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160112"/>
                  <criterion comment="glassfish-jaxb-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416012"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160131"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-runtime is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160132"/>
                  <criterion comment="glassfish-jaxb-runtime is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416014"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160151"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="glassfish-jaxb-txw2 is earlier than 0:2.2.11-11.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160152"/>
                  <criterion comment="glassfish-jaxb-txw2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416016"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-annotations is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440171"/>
                  <criterion comment="jackson-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416018"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-annotations is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440172"/>
                  <criterion comment="jackson-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416018"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-core is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440191"/>
                  <criterion comment="jackson-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416020"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-core is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440192"/>
                  <criterion comment="jackson-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416020"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-databind is earlier than 0:2.10.0-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202016440211"/>
                  <criterion comment="jackson-databind is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416022"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-databind is earlier than 0:2.10.0-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202016440212"/>
                  <criterion comment="jackson-databind is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416022"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160231"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-json-provider is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160232"/>
                  <criterion comment="jackson-jaxrs-json-provider is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416024"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160251"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-jaxrs-providers is earlier than 0:2.9.9-1.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160252"/>
                  <criterion comment="jackson-jaxrs-providers is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416026"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160271"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jackson-module-jaxb-annotations is earlier than 0:2.7.6-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160272"/>
                  <criterion comment="jackson-module-jaxb-annotations is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416028"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160291"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jakarta-commons-httpclient is earlier than 1:3.1-28.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160292"/>
                  <criterion comment="jakarta-commons-httpclient is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416030"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160311"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160312"/>
                  <criterion comment="javassist is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416032"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160331"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="javassist-javadoc is earlier than 0:3.18.1-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160332"/>
                  <criterion comment="javassist-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416034"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.30-1.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alsa:tst:202048470371"/>
                  <criterion comment="pki-servlet-4.0-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416036"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.30-1.module_el8.4.0+2351+bb8828ef" test_ref="oval:org.almalinux.alsa:tst:202048470372"/>
                  <criterion comment="pki-servlet-4.0-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416036"/>
                  <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-4.0-api is earlier than 1:9.0.30-1.module_el8.4.0+595+e59c9af2" test_ref="oval:org.almalinux.alsa:tst:202048470373"/>
                  <criterion comment="pki-servlet-4.0-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160362"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-engine is earlier than 1:9.0.30-1.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alsa:tst:202048470391"/>
                  <criterion comment="pki-servlet-engine is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416038"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-engine is earlier than 1:9.0.30-1.module_el8.4.0+2351+bb8828ef" test_ref="oval:org.almalinux.alsa:tst:202048470392"/>
                  <criterion comment="pki-servlet-engine is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416038"/>
                  <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-servlet-engine is earlier than 1:9.0.30-1.module_el8.4.0+595+e59c9af2" test_ref="oval:org.almalinux.alsa:tst:202048470393"/>
                  <criterion comment="pki-servlet-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160382"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160391"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python-nss-doc is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160392"/>
                  <criterion comment="python-nss-doc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+2577+9e95fe00.alma" test_ref="oval:org.almalinux.alba:tst:201934160411"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-nss is earlier than 0:1.0.1-10.module_el8.5.0+150+5f0dbea0.alma" test_ref="oval:org.almalinux.alba:tst:201934160412"/>
                  <criterion comment="python3-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160431"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="relaxngDatatype is earlier than 0:2011.1-7.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160432"/>
                  <criterion comment="relaxngDatatype is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416044"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+2058+6bf11631" test_ref="oval:org.almalinux.alsa:tst:202048470471"/>
                  <criterion comment="resteasy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416046"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="resteasy is earlier than 0:3.0.26-3.module_el8.3.0+454+67dccca4" test_ref="oval:org.almalinux.alsa:tst:202048470472"/>
                  <criterion comment="resteasy is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160462"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160471"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160472"/>
                  <criterion comment="slf4j is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416048"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160491"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="slf4j-jdk14 is earlier than 0:1.7.25-4.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160492"/>
                  <criterion comment="slf4j-jdk14 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416050"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202048470531"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="stax-ex is earlier than 0:1.7.7-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202048470532"/>
                  <criterion comment="stax-ex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416052"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160531"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="velocity is earlier than 0:1.7-24.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160532"/>
                  <criterion comment="velocity is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416054"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160551"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xalan-j2 is earlier than 0:2.7.1-38.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160552"/>
                  <criterion comment="xalan-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416056"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160571"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xerces-j2 is earlier than 0:2.11.0-34.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160572"/>
                  <criterion comment="xerces-j2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416058"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160591"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-apis is earlier than 0:1.4.01-25.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160592"/>
                  <criterion comment="xml-commons-apis is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416060"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160611"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xml-commons-resolver is earlier than 0:1.2-26.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160612"/>
                  <criterion comment="xml-commons-resolver is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416062"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alsa:tst:202048470651"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xmlstreambuffer is earlier than 0:1.5.4-8.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alsa:tst:202048470652"/>
                  <criterion comment="xmlstreambuffer is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416064"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+2577+9e95fe00" test_ref="oval:org.almalinux.alba:tst:201934160651"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="xsom is earlier than 0:0-19.20110809svn.module_el8.5.0+150+5f0dbea0" test_ref="oval:org.almalinux.alba:tst:201934160652"/>
                  <criterion comment="xsom is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416066"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module pki-core:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416094"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="jss is earlier than 0:4.7.3-1.module_el8.3.0+2061+d5cd4219.alma" test_ref="oval:org.almalinux.alsa:tst:202048470701"/>
                  <criterion comment="jss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416069"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jss is earlier than 0:4.7.3-1.module_el8.3.0+500+458aeb54" test_ref="oval:org.almalinux.alsa:tst:202048470702"/>
                  <criterion comment="jss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160692"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jss-javadoc is earlier than 0:4.7.3-1.module_el8.3.0+2061+d5cd4219.alma" test_ref="oval:org.almalinux.alsa:tst:202048470721"/>
                  <criterion comment="jss-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416071"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="jss-javadoc is earlier than 0:4.7.3-1.module_el8.3.0+500+458aeb54" test_ref="oval:org.almalinux.alsa:tst:202048470722"/>
                  <criterion comment="jss-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160712"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.3.0+2061+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:202048470741"/>
                  <criterion comment="ldapjdk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416073"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.4.0+2497+635979e4" test_ref="oval:org.almalinux.alsa:tst:202048470742"/>
                  <criterion comment="ldapjdk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416073"/>
                  <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.4.0+627+e8937f0b" test_ref="oval:org.almalinux.alsa:tst:202048470743"/>
                  <criterion comment="ldapjdk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160732"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.3.0+2061+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:202048470761"/>
                  <criterion comment="ldapjdk-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416075"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.4.0+2497+635979e4" test_ref="oval:org.almalinux.alsa:tst:202048470762"/>
                  <criterion comment="ldapjdk-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416075"/>
                  <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.4.0+627+e8937f0b" test_ref="oval:org.almalinux.alsa:tst:202048470763"/>
                  <criterion comment="ldapjdk-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160752"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416077"/>
                  <criterion comment="pki-base is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-base-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416079"/>
                  <criterion comment="pki-base-java is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-ca is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416081"/>
                  <criterion comment="pki-ca is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-kra is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416083"/>
                  <criterion comment="pki-kra is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416085"/>
                  <criterion comment="pki-server is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847086"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-symkey is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416087"/>
                  <criterion comment="pki-symkey is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="pki-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416089"/>
                  <criterion comment="pki-tools is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-pki is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416091"/>
                  <criterion comment="python3-pki is earlier than 0:10.9.4-1.module+el8.3.0+8058+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:20204847092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="tomcatjss is earlier than 0:7.5.0-1.module_el8.3.0+2061+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:202048470941"/>
                  <criterion comment="tomcatjss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416093"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="tomcatjss is earlier than 0:7.5.0-1.module_el8.3.0+470+ca766673" test_ref="oval:org.almalinux.alsa:tst:202048470942"/>
                  <criterion comment="tomcatjss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160932"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204913" version="636">
      <metadata>
        <title>ALSA-2020:4913: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4913" ref_url="https://errata.almalinux.org/8/ALSA-2020-4913.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4913" ref_url="https://access.redhat.com/errata/RHSA-2020:4913" source="RHSA"/>
        <reference ref_id="CVE-2020-15683" ref_url="https://access.redhat.com/security/cve/CVE-2020-15683" source="CVE"/>
        <reference ref_id="CVE-2020-15969" ref_url="https://access.redhat.com/security/cve/CVE-2020-15969" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.4.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)

* chromium-browser: Use after free in WebRTC (CVE-2020-15969)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-04"/>
          <updated date="2020-11-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-15683" impact="important" public="20201020">CVE-2020-15683</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2020-15969" impact="important" public="20201006">CVE-2020-15969</cve>
          <bugzilla href="https://bugzilla.redhat.com/1885885" id="1885885">CVE-2020-15969 chromium-browser: Use after free in WebRTC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889932" id="1889932">CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.4.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20204913001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20204952" version="635">
      <metadata>
        <title>ALSA-2020:4952: freetype security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:4952" ref_url="https://errata.almalinux.org/8/ALSA-2020-4952.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:4952" ref_url="https://access.redhat.com/errata/RHSA-2020:4952" source="RHSA"/>
        <reference ref_id="CVE-2020-15999" ref_url="https://access.redhat.com/security/cve/CVE-2020-15999" source="CVE"/>
        <description>FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.

Security Fix(es):

* freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-05"/>
          <updated date="2020-11-05"/>
          <cve cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-190-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-15999" impact="important" public="20201019">CVE-2020-15999</cve>
          <bugzilla href="https://bugzilla.redhat.com/1890210" id="1890210">CVE-2020-15999 freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="freetype is earlier than 0:2.9.1-4.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20204952001"/>
              <criterion comment="freetype is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204952002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="freetype-devel is earlier than 0:2.9.1-4.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20204952003"/>
              <criterion comment="freetype-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20204952004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205085" version="638">
      <metadata>
        <title>ALSA-2020:5085: microcode_ctl security, bug fix and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5085" ref_url="https://errata.almalinux.org/8/ALSA-2020-5085.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5085" ref_url="https://access.redhat.com/errata/RHSA-2020:5085" source="RHSA"/>
        <reference ref_id="CVE-2020-8695" ref_url="https://access.redhat.com/security/cve/CVE-2020-8695" source="CVE"/>
        <reference ref_id="CVE-2020-8696" ref_url="https://access.redhat.com/security/cve/CVE-2020-8696" source="CVE"/>
        <reference ref_id="CVE-2020-8698" ref_url="https://access.redhat.com/security/cve/CVE-2020-8698" source="CVE"/>
        <description>Security Fix(es):

* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

* hw: Vector Register Leakage-Active (CVE-2020-8696)

* hw: Fast forward store predictor (CVE-2020-8698)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es) and Enhancement(s):

* Update Intel CPU microcode to microcode-20201027 release, addresses:
  - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
  - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
  - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
  - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
  - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
  - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision
    0xe0;
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up
    to 0x2006a08;
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up
    to 0xde;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up
    to 0xde;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up
    to 0xe0;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up
    to 0xde;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
    revision 0xd6 up to 0xde;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up
    to 0xde;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up
    to 0xde;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up
    to 0xde;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up
    to 0xde;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up
    to 0xde;
  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
    from revision 0x43 up to 0x44;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157
    up to 0x1000159;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01
    up to 0x4003003;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5002f01 up to 0x5003003;
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up
    to 0x40;
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up
    to 0x1e;
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up
    to 0x18;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78
    up to 0xa0;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca
    up to 0xe0.

* Add README file to the documentation directory.

* Add publicly-sourced codenames list to supply to gen_provides.sh; update
  the latter to handle the somewhat different format.

* Add SUMMARY.intel-ucode file containing metadata information from
  the microcode file headers.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-11"/>
          <updated date="2020-11-11"/>
          <cve cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-8695" impact="moderate" public="20201110">CVE-2020-8695</cve>
          <cve cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-8696" impact="moderate" public="20201110:1355">CVE-2020-8696</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-8698" impact="moderate" public="20201110:1355">CVE-2020-8698</cve>
          <bugzilla href="https://bugzilla.redhat.com/1828583" id="1828583">CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890355" id="1890355">CVE-2020-8696 hw: Vector Register Leakage-Active</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890356" id="1890356">CVE-2020-8698 hw: Fast forward store predictor</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl is earlier than 4:20200609-2.20201027.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205085001"/>
          <criterion comment="microcode_ctl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20210621002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205100" version="634">
      <metadata>
        <title>ALSA-2020:5100: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5100" ref_url="https://errata.almalinux.org/8/ALSA-2020-5100.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5100" ref_url="https://access.redhat.com/errata/RHSA-2020:5100" source="RHSA"/>
        <reference ref_id="CVE-2020-26950" ref_url="https://access.redhat.com/security/cve/CVE-2020-26950" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.4.1 ESR.

Security Fix(es):

* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-12"/>
          <updated date="2020-11-12"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26950" impact="critical" public="20201109">CVE-2020-26950</cve>
          <bugzilla href="https://bugzilla.redhat.com/1896306" id="1896306">CVE-2020-26950 Mozilla: Write side effects in MCallGetProperty opcode not accounted for</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.4.1-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205100001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205146" version="637">
      <metadata>
        <title>ALSA-2020:5146: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5146" ref_url="https://errata.almalinux.org/8/ALSA-2020-5146.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5146" ref_url="https://access.redhat.com/errata/RHSA-2020:5146" source="RHSA"/>
        <reference ref_id="CVE-2020-26950" ref_url="https://access.redhat.com/security/cve/CVE-2020-26950" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.4.3.

Security Fix(es):

* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-18"/>
          <updated date="2020-11-18"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26950" impact="important" public="20201109">CVE-2020-26950</cve>
          <bugzilla href="https://bugzilla.redhat.com/1896306" id="1896306">CVE-2020-26950 Mozilla: Write side effects in MCallGetProperty opcode not accounted for</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.4.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205146001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205236" version="636">
      <metadata>
        <title>ALSA-2020:5236: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5236" ref_url="https://errata.almalinux.org/8/ALSA-2020-5236.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5236" ref_url="https://access.redhat.com/errata/RHSA-2020:5236" source="RHSA"/>
        <reference ref_id="CVE-2020-16012" ref_url="https://access.redhat.com/security/cve/CVE-2020-16012" source="CVE"/>
        <reference ref_id="CVE-2020-26951" ref_url="https://access.redhat.com/security/cve/CVE-2020-26951" source="CVE"/>
        <reference ref_id="CVE-2020-26953" ref_url="https://access.redhat.com/security/cve/CVE-2020-26953" source="CVE"/>
        <reference ref_id="CVE-2020-26956" ref_url="https://access.redhat.com/security/cve/CVE-2020-26956" source="CVE"/>
        <reference ref_id="CVE-2020-26958" ref_url="https://access.redhat.com/security/cve/CVE-2020-26958" source="CVE"/>
        <reference ref_id="CVE-2020-26959" ref_url="https://access.redhat.com/security/cve/CVE-2020-26959" source="CVE"/>
        <reference ref_id="CVE-2020-26960" ref_url="https://access.redhat.com/security/cve/CVE-2020-26960" source="CVE"/>
        <reference ref_id="CVE-2020-26961" ref_url="https://access.redhat.com/security/cve/CVE-2020-26961" source="CVE"/>
        <reference ref_id="CVE-2020-26965" ref_url="https://access.redhat.com/security/cve/CVE-2020-26965" source="CVE"/>
        <reference ref_id="CVE-2020-26968" ref_url="https://access.redhat.com/security/cve/CVE-2020-26968" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.5.0.

Security Fix(es):

* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951)

* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968)

* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012)

* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953)

* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956)

* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958)

* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959)

* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960)

* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961)

* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-30"/>
          <updated date="2020-11-30"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2020-16012" impact="moderate" public="20201117">CVE-2020-16012</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-354" href="https://access.redhat.com/security/cve/CVE-2020-26951" impact="important" public="20201117">CVE-2020-26951</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2020-26953" impact="moderate" public="20201117">CVE-2020-26953</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-26956" impact="moderate" public="20201117">CVE-2020-26956</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-26958" impact="moderate" public="20201117">CVE-2020-26958</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26959" impact="moderate" public="20201117">CVE-2020-26959</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26960" impact="moderate" public="20201117">CVE-2020-26960</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-26961" impact="moderate" public="20201117">CVE-2020-26961</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-26965" impact="low" public="20201117">CVE-2020-26965</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-26968" impact="important" public="20201117">CVE-2020-26968</cve>
          <bugzilla href="https://bugzilla.redhat.com/1898731" id="1898731">CVE-2020-26951 Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898732" id="1898732">CVE-2020-16012 Mozilla: Variable time processing of cross-origin images during drawImage calls</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898733" id="1898733">CVE-2020-26953 Mozilla: Fullscreen could be enabled without displaying the security UI</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898734" id="1898734">CVE-2020-26956 Mozilla: XSS through paste (manual and clipboard API)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898735" id="1898735">CVE-2020-26958 Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898736" id="1898736">CVE-2020-26959 Mozilla: Use-after-free in WebRequestService</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898737" id="1898737">CVE-2020-26960 Mozilla: Potential use-after-free in uses of nsTArray</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898738" id="1898738">CVE-2020-26961 Mozilla: DoH did not filter IPv4 mapped IP Addresses</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898739" id="1898739">CVE-2020-26965 Mozilla: Software keyboards may have remembered typed passwords</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898741" id="1898741">CVE-2020-26968 Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.5.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205236001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205237" version="636">
      <metadata>
        <title>ALSA-2020:5237: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5237" ref_url="https://errata.almalinux.org/8/ALSA-2020-5237.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5237" ref_url="https://access.redhat.com/errata/RHSA-2020:5237" source="RHSA"/>
        <reference ref_id="CVE-2020-16012" ref_url="https://access.redhat.com/security/cve/CVE-2020-16012" source="CVE"/>
        <reference ref_id="CVE-2020-26951" ref_url="https://access.redhat.com/security/cve/CVE-2020-26951" source="CVE"/>
        <reference ref_id="CVE-2020-26953" ref_url="https://access.redhat.com/security/cve/CVE-2020-26953" source="CVE"/>
        <reference ref_id="CVE-2020-26956" ref_url="https://access.redhat.com/security/cve/CVE-2020-26956" source="CVE"/>
        <reference ref_id="CVE-2020-26958" ref_url="https://access.redhat.com/security/cve/CVE-2020-26958" source="CVE"/>
        <reference ref_id="CVE-2020-26959" ref_url="https://access.redhat.com/security/cve/CVE-2020-26959" source="CVE"/>
        <reference ref_id="CVE-2020-26960" ref_url="https://access.redhat.com/security/cve/CVE-2020-26960" source="CVE"/>
        <reference ref_id="CVE-2020-26961" ref_url="https://access.redhat.com/security/cve/CVE-2020-26961" source="CVE"/>
        <reference ref_id="CVE-2020-26965" ref_url="https://access.redhat.com/security/cve/CVE-2020-26965" source="CVE"/>
        <reference ref_id="CVE-2020-26968" ref_url="https://access.redhat.com/security/cve/CVE-2020-26968" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.5.0 ESR.

Security Fix(es):

* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951)

* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968)

* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012)

* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953)

* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956)

* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958)

* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959)

* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960)

* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961)

* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-11-30"/>
          <updated date="2020-11-30"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2020-16012" impact="moderate" public="20201117">CVE-2020-16012</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-354" href="https://access.redhat.com/security/cve/CVE-2020-26951" impact="important" public="20201117">CVE-2020-26951</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-451" href="https://access.redhat.com/security/cve/CVE-2020-26953" impact="moderate" public="20201117">CVE-2020-26953</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-26956" impact="moderate" public="20201117">CVE-2020-26956</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-26958" impact="moderate" public="20201117">CVE-2020-26958</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26959" impact="moderate" public="20201117">CVE-2020-26959</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26960" impact="moderate" public="20201117">CVE-2020-26960</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-26961" impact="moderate" public="20201117">CVE-2020-26961</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-212" href="https://access.redhat.com/security/cve/CVE-2020-26965" impact="low" public="20201117">CVE-2020-26965</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-26968" impact="important" public="20201117">CVE-2020-26968</cve>
          <bugzilla href="https://bugzilla.redhat.com/1898731" id="1898731">CVE-2020-26951 Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898732" id="1898732">CVE-2020-16012 Mozilla: Variable time processing of cross-origin images during drawImage calls</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898733" id="1898733">CVE-2020-26953 Mozilla: Fullscreen could be enabled without displaying the security UI</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898734" id="1898734">CVE-2020-26956 Mozilla: XSS through paste (manual and clipboard API)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898735" id="1898735">CVE-2020-26958 Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898736" id="1898736">CVE-2020-26959 Mozilla: Use-after-free in WebRequestService</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898737" id="1898737">CVE-2020-26960 Mozilla: Potential use-after-free in uses of nsTArray</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898738" id="1898738">CVE-2020-26961 Mozilla: DoH did not filter IPv4 mapped IP Addresses</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898739" id="1898739">CVE-2020-26965 Mozilla: Software keyboards may have remembered typed passwords</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898741" id="1898741">CVE-2020-26968 Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.5.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205237001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205393" version="635">
      <metadata>
        <title>ALSA-2020:5393: libexif security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5393" ref_url="https://errata.almalinux.org/8/ALSA-2020-5393.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5393" ref_url="https://access.redhat.com/errata/RHSA-2020:5393" source="RHSA"/>
        <reference ref_id="CVE-2020-0452" ref_url="https://access.redhat.com/security/cve/CVE-2020-0452" source="CVE"/>
        <description>The libexif packages provide a library for extracting extra information from image files.

Security Fix(es):

* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-14"/>
          <updated date="2020-12-14"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://access.redhat.com/security/cve/CVE-2020-0452" impact="important" public="20201110">CVE-2020-0452</cve>
          <bugzilla href="https://bugzilla.redhat.com/1902004" id="1902004">CVE-2020-0452 libexif: out of bounds write due to an integer overflow in exif-entry.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libexif is earlier than 0:0.6.22-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205393001"/>
              <criterion comment="libexif is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libexif-devel is earlier than 0:0.6.22-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205393003"/>
              <criterion comment="libexif-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202550004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205398" version="636">
      <metadata>
        <title>ALSA-2020:5398: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5398" ref_url="https://errata.almalinux.org/8/ALSA-2020-5398.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5398" ref_url="https://access.redhat.com/errata/RHSA-2020:5398" source="RHSA"/>
        <reference ref_id="CVE-2020-26970" ref_url="https://access.redhat.com/security/cve/CVE-2020-26970" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.5.1.

Security Fix(es):

* Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-14"/>
          <updated date="2020-12-14"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2020-26970" impact="important" public="20201201">CVE-2020-26970</cve>
          <bugzilla href="https://bugzilla.redhat.com/1903443" id="1903443">CVE-2020-26970 Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.5.1-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205398001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205401" version="635">
      <metadata>
        <title>ALSA-2020:5401: libpq security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5401" ref_url="https://errata.almalinux.org/8/ALSA-2020-5401.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5401" ref_url="https://access.redhat.com/errata/RHSA-2020:5401" source="RHSA"/>
        <reference ref_id="CVE-2020-25694" ref_url="https://access.redhat.com/security/cve/CVE-2020-25694" source="CVE"/>
        <reference ref_id="CVE-2020-25696" ref_url="https://access.redhat.com/security/cve/CVE-2020-25696" source="CVE"/>
        <description>The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. 

The following packages have been upgraded to a later upstream version: libpq (12.5). (BZ#1898228, BZ#1901558)

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)

* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-14"/>
          <updated date="2020-12-14"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-25694" impact="important" public="20201112">CVE-2020-25694</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-183-&gt;CWE-270" href="https://access.redhat.com/security/cve/CVE-2020-25696" impact="moderate" public="20201112">CVE-2020-25696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1894423" id="1894423">CVE-2020-25694 postgresql: Reconnection can downgrade connection security settings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894430" id="1894430">CVE-2020-25696 postgresql: psql's \gset allows overwriting specially treated variables</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libpq is earlier than 0:12.5-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205401001"/>
              <criterion comment="libpq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20200343002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libpq-devel is earlier than 0:12.5-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205401003"/>
              <criterion comment="libpq-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alea:tst:20200343004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205473" version="641">
      <metadata>
        <title>ALSA-2020:5473: kernel security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5473" ref_url="https://errata.almalinux.org/8/ALSA-2020-5473.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5473" ref_url="https://access.redhat.com/errata/RHSA-2020:5473" source="RHSA"/>
        <reference ref_id="CVE-2020-16166" ref_url="https://access.redhat.com/security/cve/CVE-2020-16166" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: information exposure in drivers/char/random.c and kernel/time/timer.c (CVE-2020-16166)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Backport upstream OVS performance patch fix (BZ#1879935)

* Sleeping or scheduling after sched_cpu_dying() led to "scheduling while atomic" and BUG at kernel/cpu.c:907! (BZ#1880080)

* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882094)

* Unexpected fragmentation needed error, OpenShift 4, OVS, VXLAN, GSO, Azure (BZ#1885766)

* Unable to attach VLAN-based logical networks to a bond (BZ#1886017)

* NFS server with krb5p fails in FIPS mode: context_derive_keys_new: Error 22 deriving initiator_seal key (BZ#1886189)

* XFS: reflinked file data corruption (BZ#1886895)

* [HPE 8.3 Bug] Kdump bootup failure caused by an amd iommu commit for Rhel8.3 BetaOS on DL325Gen10 (BZ#1888113)

* dm: fix bio splitting and its bio completion order for regular IO (BZ#1890233)

* geneve: add transport ports in route lookup for geneve (BZ#1891818)

* HRTICK not armed in specific cases with SCHED_DEADLINE (BZ#1894073)

* PM/swap Speed up hibernation by batching requests (BZ#1894629)

* RHEL8.1 - ibmveth is producing TX errors over VXLAN when large send (TSO) is enabled (-&gt; related to Red Hat bug 1816254 - OCP 4.3 - Authentication clusteroperator is in unknown state on POWER 9 servers") (BZ#1896299)

* RHEL8.2 - mm/gup: fix gup_fast with dynamic page table folding (BZ#1896351)

* [Azure][RHEL-8]TX/RX packets stop increasing after hibernation/resume in VM with CX4 VF NIC (BZ#1896433)

* [Azure][RHEL-8]VM hangs after hibernation/resume if the VM has SRIOV NIC and has been deallocated (BZ#1896434)

* [Azure] hv_irq_unmask() failed: 0x5 after resume from hibernation in NV6 size (BZ#1896435)

* block layer: update to upstream v5.8 (BZ#1896787)

* [Regression] RHEL8.2 zstream - Undetected Data corruption in MPI workloads that use VSX for reductions on POWER9 DD2.1 systems (BZ#1897278)

* Incorrect system time reported through the CPU Accounting statistics (BZ#1897716)

* debug kernel reports BUG: sleeping function called from invalid context at mm/slab.h:496 in aws t4g instances (BZ#1898758)

* ARO: excessive pod memory allocation causes node lockup (BZ#1901547)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-16166" impact="moderate" public="20200729">CVE-2020-16166</cve>
          <bugzilla href="https://bugzilla.redhat.com/1865751" id="1865751">CVE-2020-16166 kernel: information exposure in drivers/char/random.c and kernel/time/timer.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-240.8.1.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20205473047"/>
            <criterion comment="kernel earlier than 0:4.18.0-240.8.1.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20205473048"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473009"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473011"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473013"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473015"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473017"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473019"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473021"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473023"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473025"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473027"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473029"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473031"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473033"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473035"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473037"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473039"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473041"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473043"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-240.8.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205473045"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205476" version="637">
      <metadata>
        <title>ALSA-2020:5476: openssl security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5476" ref_url="https://errata.almalinux.org/8/ALSA-2020-5476.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5476" ref_url="https://access.redhat.com/errata/RHSA-2020:5476" source="RHSA"/>
        <reference ref_id="CVE-2020-1971" ref_url="https://access.redhat.com/security/cve/CVE-2020-1971" source="CVE"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Reject certificates with explicit EC parameters in strict mode (BZ#1891541)

* Add FIPS selftest for HKDF, SSKDF, SSHKDF, and TLS12PRF; add DH_compute_key KAT to DH selftest (BZ#1891542)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://access.redhat.com/security/cve/CVE-2020-1971" impact="important" public="20201208">CVE-2020-1971</cve>
          <bugzilla href="https://bugzilla.redhat.com/1903409" id="1903409">CVE-2020-1971 openssl: EDIPARTYNAME NULL pointer de-reference</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="openssl is earlier than 1:1.1.1g-12.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205476001"/>
              <criterion comment="openssl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-devel is earlier than 1:1.1.1g-12.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205476003"/>
              <criterion comment="openssl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-libs is earlier than 1:1.1.1g-12.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205476005"/>
              <criterion comment="openssl-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="openssl-perl is earlier than 1:1.1.1g-12.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205476007"/>
              <criterion comment="openssl-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193700008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205479" version="638">
      <metadata>
        <title>ALSA-2020:5479: linux-firmware security and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5479" ref_url="https://errata.almalinux.org/8/ALSA-2020-5479.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5479" ref_url="https://access.redhat.com/errata/RHSA-2020:5479" source="RHSA"/>
        <reference ref_id="CVE-2020-12321" ref_url="https://access.redhat.com/security/cve/CVE-2020-12321" source="CVE"/>
        <description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.

Security Fix(es):

* hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Enhancement(s):

* [Intel 8.3 FEAT] ice: Update to the Default OS DDP Package for ice driver (BZ#1896597)

* [Intel 8.3 FEAT] ice: Pull Comms Market Segment Package into RHEL 8.3 (BZ#1896598)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-12321" impact="important" public="20201110:1355">CVE-2020-12321</cve>
          <bugzilla href="https://bugzilla.redhat.com/1893914" id="1893914">CVE-2020-12321 hardware: buffer overflow in bluetooth firmware</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="iwl100-firmware is earlier than 0:39.31.5.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479001"/>
              <criterion comment="iwl100-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl1000-firmware is earlier than 1:39.31.5.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479003"/>
              <criterion comment="iwl1000-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl105-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479005"/>
              <criterion comment="iwl105-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl135-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479007"/>
              <criterion comment="iwl135-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl2000-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479009"/>
              <criterion comment="iwl2000-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl2030-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479011"/>
              <criterion comment="iwl2030-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl3160-firmware is earlier than 1:25.30.13.0-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479013"/>
              <criterion comment="iwl3160-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl3945-firmware is earlier than 0:15.32.2.9-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479015"/>
              <criterion comment="iwl3945-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl4965-firmware is earlier than 0:228.61.2.24-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479017"/>
              <criterion comment="iwl4965-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl5000-firmware is earlier than 0:8.83.5.1_1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479019"/>
              <criterion comment="iwl5000-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl5150-firmware is earlier than 0:8.24.2.2-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479021"/>
              <criterion comment="iwl5150-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl6000-firmware is earlier than 0:9.221.4.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479023"/>
              <criterion comment="iwl6000-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl6000g2a-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479025"/>
              <criterion comment="iwl6000g2a-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl6000g2b-firmware is earlier than 0:18.168.6.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479027"/>
              <criterion comment="iwl6000g2b-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl6050-firmware is earlier than 0:41.28.5.1-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479029"/>
              <criterion comment="iwl6050-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="iwl7260-firmware is earlier than 1:25.30.13.0-101.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205479031"/>
              <criterion comment="iwl7260-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libertas-sd8686-firmware is earlier than 0:20200619-101.git3890db36.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205479033"/>
              <criterion comment="libertas-sd8686-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libertas-sd8787-firmware is earlier than 0:20200619-101.git3890db36.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205479035"/>
              <criterion comment="libertas-sd8787-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libertas-usb8388-firmware is earlier than 2:20200619-101.git3890db36.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205479037"/>
              <criterion comment="libertas-usb8388-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libertas-usb8388-olpc-firmware is earlier than 0:20200619-101.git3890db36.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205479039"/>
              <criterion comment="libertas-usb8388-olpc-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="linux-firmware is earlier than 0:20200619-101.git3890db36.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205479041"/>
              <criterion comment="linux-firmware is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205479042"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205480" version="636">
      <metadata>
        <title>ALSA-2020:5480: net-snmp security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5480" ref_url="https://errata.almalinux.org/8/ALSA-2020-5480.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5480" ref_url="https://access.redhat.com/errata/RHSA-2020:5480" source="RHSA"/>
        <reference ref_id="CVE-2020-15862" ref_url="https://access.redhat.com/security/cve/CVE-2020-15862" source="CVE"/>
        <description>The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.

Security Fix(es):

* net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In RHEL 8, snmpd using v3 is unable to send out default 60 maxGetbulkResponses when invalid PID specified. (BZ#1896760)

* AVC denied for snmpd / snmptrapd (BZ#1902662)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-250" href="https://access.redhat.com/security/cve/CVE-2020-15862" impact="important" public="20200825">CVE-2020-15862</cve>
          <bugzilla href="https://bugzilla.redhat.com/1873038" id="1873038">CVE-2020-15862 net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="net-snmp is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480001"/>
              <criterion comment="net-snmp is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-agent-libs is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480003"/>
              <criterion comment="net-snmp-agent-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-devel is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480005"/>
              <criterion comment="net-snmp-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-libs is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480007"/>
              <criterion comment="net-snmp-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-perl is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480009"/>
              <criterion comment="net-snmp-perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205480010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="net-snmp-utils is earlier than 1:5.8-18.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205480011"/>
              <criterion comment="net-snmp-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alba:tst:20201376010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205483" version="635">
      <metadata>
        <title>ALSA-2020:5483: gnutls security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5483" ref_url="https://errata.almalinux.org/8/ALSA-2020-5483.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5483" ref_url="https://access.redhat.com/errata/RHSA-2020:5483" source="RHSA"/>
        <reference ref_id="CVE-2020-24659" ref_url="https://access.redhat.com/security/cve/CVE-2020-24659" source="CVE"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: Heap buffer overflow in handshake with no_renegotiation alert sent (CVE-2020-24659)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* gnutls: Add self-tests for implemented KDF algorithms and CMAC (BZ#1903037)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-24659" impact="moderate" public="20200904">CVE-2020-24659</cve>
          <bugzilla href="https://bugzilla.redhat.com/1872021" id="1872021">CVE-2020-24659 gnutls: Heap buffer overflow in handshake with no_renegotiation alert sent</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="gnutls is earlier than 0:3.6.14-7.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205483001"/>
              <criterion comment="gnutls is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-c++ is earlier than 0:3.6.14-7.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205483003"/>
              <criterion comment="gnutls-c++ is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-dane is earlier than 0:3.6.14-7.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205483005"/>
              <criterion comment="gnutls-dane is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-devel is earlier than 0:3.6.14-7.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205483007"/>
              <criterion comment="gnutls-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="gnutls-utils is earlier than 0:3.6.14-7.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205483009"/>
              <criterion comment="gnutls-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193600010"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205487" version="635">
      <metadata>
        <title>ALSA-2020:5487: pacemaker security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5487" ref_url="https://errata.almalinux.org/8/ALSA-2020-5487.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5487" ref_url="https://access.redhat.com/errata/RHSA-2020:5487" source="RHSA"/>
        <reference ref_id="CVE-2020-25654" ref_url="https://access.redhat.com/security/cve/CVE-2020-25654" source="CVE"/>
        <description>The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. 

Security Fix(es):

* pacemaker: ACL restrictions bypass (CVE-2020-25654)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2020-25654" impact="moderate" public="20201027">CVE-2020-25654</cve>
          <bugzilla href="https://bugzilla.redhat.com/1888191" id="1888191">CVE-2020-25654 pacemaker: ACL restrictions bypass</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::resilientstorage</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pacemaker is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487001"/>
              <criterion comment="pacemaker is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cli is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487003"/>
              <criterion comment="pacemaker-cli is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cluster-libs is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487005"/>
              <criterion comment="pacemaker-cluster-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-cts is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487007"/>
              <criterion comment="pacemaker-cts is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-doc is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487009"/>
              <criterion comment="pacemaker-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-libs is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487011"/>
              <criterion comment="pacemaker-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-libs-devel is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487013"/>
              <criterion comment="pacemaker-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-nagios-plugins-metadata is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487015"/>
              <criterion comment="pacemaker-nagios-plugins-metadata is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-remote is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487017"/>
              <criterion comment="pacemaker-remote is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pacemaker-schemas is earlier than 0:2.0.4-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20205487019"/>
              <criterion comment="pacemaker-schemas is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191279020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205493" version="636">
      <metadata>
        <title>ALSA-2020:5493: go-toolset:rhel8 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5493" ref_url="https://errata.almalinux.org/8/ALSA-2020-5493.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5493" ref_url="https://access.redhat.com/errata/RHSA-2020:5493" source="RHSA"/>
        <reference ref_id="CVE-2020-24553" ref_url="https://access.redhat.com/security/cve/CVE-2020-24553" source="CVE"/>
        <reference ref_id="CVE-2020-28362" ref_url="https://access.redhat.com/security/cve/CVE-2020-28362" source="CVE"/>
        <reference ref_id="CVE-2020-28366" ref_url="https://access.redhat.com/security/cve/CVE-2020-28366" source="CVE"/>
        <reference ref_id="CVE-2020-28367" ref_url="https://access.redhat.com/security/cve/CVE-2020-28367" source="CVE"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

* golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS (CVE-2020-24553)

* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)

* golang: malicious symbol names can lead to code execution at build time (CVE-2020-28366)

* golang: improper validation of cgo flags can lead to code execution at build time (CVE-2020-28367)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-79" href="https://access.redhat.com/security/cve/CVE-2020-24553" impact="moderate" public="20200801">CVE-2020-24553</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2020-28362" impact="moderate" public="20201112">CVE-2020-28362</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-28366" impact="moderate" public="20201112">CVE-2020-28366</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-28367" impact="moderate" public="20201112">CVE-2020-28367</cve>
          <bugzilla href="https://bugzilla.redhat.com/1874857" id="1874857">CVE-2020-24553 golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1897635" id="1897635">CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1897643" id="1897643">CVE-2020-28366 golang: malicious symbol names can lead to code execution at build time</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1897646" id="1897646">CVE-2020-28367 golang: improper validation of cgo flags can lead to code execution at build time</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module go-toolset:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20191519017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="delve is earlier than 0:1.4.1-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930011"/>
              <criterion comment="delve is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203665002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="go-toolset is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930031"/>
              <criterion comment="go-toolset is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="go-toolset is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930032"/>
              <criterion comment="go-toolset is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930051"/>
              <criterion comment="golang is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930052"/>
              <criterion comment="golang is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930071"/>
              <criterion comment="golang-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-bin is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930072"/>
              <criterion comment="golang-bin is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930091"/>
              <criterion comment="golang-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-docs is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930092"/>
              <criterion comment="golang-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930111"/>
              <criterion comment="golang-misc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-misc is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930112"/>
              <criterion comment="golang-misc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190102"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-race is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930131"/>
              <criterion comment="golang-race is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930151"/>
              <criterion comment="golang-src is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519014"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-src is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930152"/>
              <criterion comment="golang-src is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190142"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is earlier than 0:1.14.12-1.module_el8.3.0+6166+380394dc" test_ref="oval:org.almalinux.alsa:tst:202054930171"/>
              <criterion comment="golang-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191519016"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="golang-tests is earlier than 0:1.14.12-1.module_el8.3.0+605+410c5674" test_ref="oval:org.almalinux.alsa:tst:202054930172"/>
              <criterion comment="golang-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201915190162"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205495" version="636">
      <metadata>
        <title>ALSA-2020:5495: nginx:1.16 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5495" ref_url="https://errata.almalinux.org/8/ALSA-2020-5495.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5495" ref_url="https://access.redhat.com/errata/RHSA-2020:5495" source="RHSA"/>
        <reference ref_id="CVE-2019-20372" ref_url="https://access.redhat.com/security/cve/CVE-2019-20372" source="CVE"/>
        <description>nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. 

Security Fix(es):

* nginx: HTTP request smuggling in configurations with URL redirect used as error_page (CVE-2019-20372)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2019-20372" impact="moderate" public="20200109">CVE-2019-20372</cve>
          <bugzilla href="https://bugzilla.redhat.com/1790277" id="1790277">CVE-2019-20372 nginx: HTTP request smuggling in configurations with URL redirect used as error_page</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nginx:1.16 is enabled" test_ref="oval:org.almalinux.alsa:tst:20205495017"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nginx is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950011"/>
              <criterion comment="nginx is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950012"/>
              <criterion comment="nginx is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-all-modules is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950031"/>
              <criterion comment="nginx-all-modules is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-all-modules is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950032"/>
              <criterion comment="nginx-all-modules is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-filesystem is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950051"/>
              <criterion comment="nginx-filesystem is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-filesystem is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950052"/>
              <criterion comment="nginx-filesystem is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-image-filter is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950071"/>
              <criterion comment="nginx-mod-http-image-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-image-filter is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950072"/>
              <criterion comment="nginx-mod-http-image-filter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-perl is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950091"/>
              <criterion comment="nginx-mod-http-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-perl is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950092"/>
              <criterion comment="nginx-mod-http-perl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-xslt-filter is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950111"/>
              <criterion comment="nginx-mod-http-xslt-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-http-xslt-filter is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950112"/>
              <criterion comment="nginx-mod-http-xslt-filter is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-mail is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950131"/>
              <criterion comment="nginx-mod-mail is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-mail is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950132"/>
              <criterion comment="nginx-mod-mail is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-stream is earlier than 1:1.16.1-1.module_el8.3.0+2166+e5e7039f.1.alma" test_ref="oval:org.almalinux.alsa:tst:202054950151"/>
              <criterion comment="nginx-mod-stream is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192799016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nginx-mod-stream is earlier than 1:1.16.1-1.module_el8.3.0+607+4f40239d.1" test_ref="oval:org.almalinux.alsa:tst:202054950152"/>
              <criterion comment="nginx-mod-stream is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201927990162"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205499" version="635">
      <metadata>
        <title>ALSA-2020:5499: nodejs:12 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5499" ref_url="https://errata.almalinux.org/8/ALSA-2020-5499.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5499" ref_url="https://access.redhat.com/errata/RHSA-2020:5499" source="RHSA"/>
        <reference ref_id="CVE-2020-15366" ref_url="https://access.redhat.com/security/cve/CVE-2020-15366" source="CVE"/>
        <reference ref_id="CVE-2020-7608" ref_url="https://access.redhat.com/security/cve/CVE-2020-7608" source="CVE"/>
        <reference ref_id="CVE-2020-7774" ref_url="https://access.redhat.com/security/cve/CVE-2020-7774" source="CVE"/>
        <reference ref_id="CVE-2020-8277" ref_url="https://access.redhat.com/security/cve/CVE-2020-8277" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)

* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)

* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* yarn install crashes with nodejs:12 on aarch64 (BZ#1901045)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-15366" impact="moderate" public="20200704">CVE-2020-15366</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-267" href="https://access.redhat.com/security/cve/CVE-2020-7608" impact="low" public="20200316">CVE-2020-7608</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-915" href="https://access.redhat.com/security/cve/CVE-2020-7774" impact="low" public="20201025">CVE-2020-7774</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8277" impact="moderate" public="20201112">CVE-2020-8277</cve>
          <bugzilla href="https://bugzilla.redhat.com/1840004" id="1840004">CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1857977" id="1857977">CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898554" id="1898554">CVE-2020-8277 c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898680" id="1898680">CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:12.19.1-1.module+el8.3.0+8851+b7b41ca0" test_ref="oval:org.almalinux.alsa:tst:20205499001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:12.19.1-1.module+el8.3.0+8851+b7b41ca0" test_ref="oval:org.almalinux.alsa:tst:20205499003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:12.19.1-1.module+el8.3.0+8851+b7b41ca0" test_ref="oval:org.almalinux.alsa:tst:20205499005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
              <criterion comment="nodejs-full-i18n is earlier than 1:12.19.1-1.module+el8.3.0+8851+b7b41ca0" test_ref="oval:org.almalinux.alsa:tst:20205499007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.2.0+311+974d721c" test_ref="oval:org.almalinux.alea:tst:202003300071"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le|x86_64" test_ref="oval:org.almalinux.alsa:tst:2019343600511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.14.8-1.12.19.1.1.module+el8.3.0+8851+b7b41ca0" test_ref="oval:org.almalinux.alsa:tst:20205499013"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205500" version="636">
      <metadata>
        <title>ALSA-2020:5500: mariadb:10.3 security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5500" ref_url="https://errata.almalinux.org/8/ALSA-2020-5500.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5500" ref_url="https://access.redhat.com/errata/RHSA-2020:5500" source="RHSA"/>
        <reference ref_id="CVE-2019-2938" ref_url="https://access.redhat.com/security/cve/CVE-2019-2938" source="CVE"/>
        <reference ref_id="CVE-2019-2974" ref_url="https://access.redhat.com/security/cve/CVE-2019-2974" source="CVE"/>
        <reference ref_id="CVE-2020-13249" ref_url="https://access.redhat.com/security/cve/CVE-2020-13249" source="CVE"/>
        <reference ref_id="CVE-2020-14765" ref_url="https://access.redhat.com/security/cve/CVE-2020-14765" source="CVE"/>
        <reference ref_id="CVE-2020-14776" ref_url="https://access.redhat.com/security/cve/CVE-2020-14776" source="CVE"/>
        <reference ref_id="CVE-2020-14789" ref_url="https://access.redhat.com/security/cve/CVE-2020-14789" source="CVE"/>
        <reference ref_id="CVE-2020-14812" ref_url="https://access.redhat.com/security/cve/CVE-2020-14812" source="CVE"/>
        <reference ref_id="CVE-2020-15180" ref_url="https://access.redhat.com/security/cve/CVE-2020-15180" source="CVE"/>
        <reference ref_id="CVE-2020-2574" ref_url="https://access.redhat.com/security/cve/CVE-2020-2574" source="CVE"/>
        <reference ref_id="CVE-2020-2752" ref_url="https://access.redhat.com/security/cve/CVE-2020-2752" source="CVE"/>
        <reference ref_id="CVE-2020-2760" ref_url="https://access.redhat.com/security/cve/CVE-2020-2760" source="CVE"/>
        <reference ref_id="CVE-2020-2780" ref_url="https://access.redhat.com/security/cve/CVE-2020-2780" source="CVE"/>
        <reference ref_id="CVE-2020-2812" ref_url="https://access.redhat.com/security/cve/CVE-2020-2812" source="CVE"/>
        <reference ref_id="CVE-2020-2814" ref_url="https://access.redhat.com/security/cve/CVE-2020-2814" source="CVE"/>
        <reference ref_id="CVE-2021-2022" ref_url="https://access.redhat.com/security/cve/CVE-2021-2022" source="CVE"/>
        <reference ref_id="CVE-2021-2144" ref_url="https://access.redhat.com/security/cve/CVE-2021-2144" source="CVE"/>
        <reference ref_id="CVE-2021-2194" ref_url="https://access.redhat.com/security/cve/CVE-2021-2194" source="CVE"/>
        <description>MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. 

The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)

Security Fix(es):

* mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)

* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974)

* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)

* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780)

* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)

* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)

* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776)

* mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789)

* mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812)

* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009)

* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017)

* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021)

* There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2938" impact="moderate" public="20191015">CVE-2019-2938</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2019-2974" impact="moderate" public="20191015">CVE-2019-2974</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-13249" impact="moderate" public="20200520">CVE-2020-13249</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14765" impact="moderate" public="20201020">CVE-2020-14765</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14776" impact="moderate" public="20201020">CVE-2020-14776</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14789" impact="moderate" public="20201020">CVE-2020-14789</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-14812" impact="moderate" public="20201020">CVE-2020-14812</cve>
          <cve cvss3="9.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-20-&gt;CWE-96" href="https://access.redhat.com/security/cve/CVE-2020-15180" impact="important" public="20201006">CVE-2020-15180</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2574" impact="low" public="20200205">CVE-2020-2574</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2752" impact="moderate" public="20200414">CVE-2020-2752</cve>
          <cve cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2760" impact="moderate" public="20200414">CVE-2020-2760</cve>
          <cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2780" impact="moderate" public="20200414">CVE-2020-2780</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2812" impact="moderate" public="20200414">CVE-2020-2812</cve>
          <cve cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2814" impact="moderate" public="20200414">CVE-2020-2814</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2022" impact="moderate" public="20210119">CVE-2021-2022</cve>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2144" impact="important" public="20210420">CVE-2021-2144</cve>
          <cve cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2021-2194" impact="moderate" public="20210420">CVE-2021-2194</cve>
          <bugzilla href="https://bugzilla.redhat.com/1764680" id="1764680">CVE-2019-2938 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1764691" id="1764691">CVE-2019-2974 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798587" id="1798587">CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830056" id="1830056">CVE-2020-2780 mysql: Server: DML unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830059" id="1830059">CVE-2020-2812 mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830060" id="1830060">CVE-2020-2814 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1830082" id="1830082">CVE-2020-2760 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835849" id="1835849">CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1839827" id="1839827">CVE-2020-13249 mariadb-connector-c: Improper validation of content in a OK packet received from server</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890738" id="1890738">CVE-2020-14765 mysql: Server: FTS unspecified vulnerability (CPU Oct 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890743" id="1890743">CVE-2020-14776 mysql: InnoDB unspecified vulnerability (CPU Oct 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890747" id="1890747">CVE-2020-14789 mysql: Server: FTS unspecified vulnerability (CPU Oct 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890756" id="1890756">CVE-2020-14812 mysql: Server: Locking unspecified vulnerability (CPU Oct 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894919" id="1894919">CVE-2020-15180 mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922389" id="1922389">CVE-2021-2022 mysql: InnoDB unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1951749" id="1951749">CVE-2021-2144 mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1951764" id="1951764">CVE-2021-2194 mysql: InnoDB unspecified vulnerability (CPU Apr 2021)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module mariadb:10.3 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193708031"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:201937080011"/>
              <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.4.0+2215+7adc332a" test_ref="oval:org.almalinux.alsa:tst:201937080012"/>
              <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Judy is earlier than 0:1.0.5-18.module_el8.5.0+104+3be1dd29" test_ref="oval:org.almalinux.alsa:tst:201937080013"/>
              <criterion comment="Judy is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="galera is earlier than 0:25.3.31-1.module_el8.3.0+2063+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000031"/>
              <criterion comment="galera is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="galera is earlier than 0:25.3.31-1.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000032"/>
              <criterion comment="galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000051"/>
              <criterion comment="mariadb is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000052"/>
              <criterion comment="mariadb is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-backup is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000071"/>
              <criterion comment="mariadb-backup is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-backup is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000072"/>
              <criterion comment="mariadb-backup is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-common is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000091"/>
              <criterion comment="mariadb-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-common is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000092"/>
              <criterion comment="mariadb-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-devel is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000111"/>
              <criterion comment="mariadb-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-devel is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000112"/>
              <criterion comment="mariadb-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-embedded is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000131"/>
              <criterion comment="mariadb-embedded is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-embedded is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000132"/>
              <criterion comment="mariadb-embedded is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-embedded-devel is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000151"/>
              <criterion comment="mariadb-embedded-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-embedded-devel is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000152"/>
              <criterion comment="mariadb-embedded-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-errmsg is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000171"/>
              <criterion comment="mariadb-errmsg is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-errmsg is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000172"/>
              <criterion comment="mariadb-errmsg is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-gssapi-server is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000191"/>
              <criterion comment="mariadb-gssapi-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-gssapi-server is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000192"/>
              <criterion comment="mariadb-gssapi-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-oqgraph-engine is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000211"/>
              <criterion comment="mariadb-oqgraph-engine is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-oqgraph-engine is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000212"/>
              <criterion comment="mariadb-oqgraph-engine is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000231"/>
              <criterion comment="mariadb-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000232"/>
              <criterion comment="mariadb-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server-galera is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000251"/>
              <criterion comment="mariadb-server-galera is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server-galera is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000252"/>
              <criterion comment="mariadb-server-galera is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server-utils is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000271"/>
              <criterion comment="mariadb-server-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-server-utils is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000272"/>
              <criterion comment="mariadb-server-utils is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-test is earlier than 3:10.3.27-3.module_el8.3.0+2028+5e3224e9" test_ref="oval:org.almalinux.alsa:tst:202055000291"/>
              <criterion comment="mariadb-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193708030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-test is earlier than 3:10.3.27-3.module_el8.3.0+599+c587b2e7" test_ref="oval:org.almalinux.alsa:tst:202055000292"/>
              <criterion comment="mariadb-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201937080302"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205503" version="635">
      <metadata>
        <title>ALSA-2020:5503: mariadb-connector-c security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5503" ref_url="https://errata.almalinux.org/8/ALSA-2020-5503.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5503" ref_url="https://access.redhat.com/errata/RHSA-2020:5503" source="RHSA"/>
        <reference ref_id="CVE-2020-13249" ref_url="https://access.redhat.com/security/cve/CVE-2020-13249" source="CVE"/>
        <reference ref_id="CVE-2020-2574" ref_url="https://access.redhat.com/security/cve/CVE-2020-2574" source="CVE"/>
        <reference ref_id="CVE-2020-2752" ref_url="https://access.redhat.com/security/cve/CVE-2020-2752" source="CVE"/>
        <reference ref_id="CVE-2020-2922" ref_url="https://access.redhat.com/security/cve/CVE-2020-2922" source="CVE"/>
        <reference ref_id="CVE-2021-2007" ref_url="https://access.redhat.com/security/cve/CVE-2021-2007" source="CVE"/>
        <description>The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. 

The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993)

Security Fix(es):

* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)

* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)

* mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249)

* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Code utilizing plugins can't be compiled properly (BZ#1899001)

* Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005)

* Replace hard-coded /usr with %{_prefix} (BZ#1899099)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-13249" impact="moderate" public="20200520">CVE-2020-13249</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-2574" impact="low" public="20200205">CVE-2020-2574</cve>
          <cve cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://access.redhat.com/security/cve/CVE-2020-2752" impact="moderate" public="20200414">CVE-2020-2752</cve>
          <cve cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-2922" impact="moderate" public="20200414">CVE-2020-2922</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2021-2007" impact="low" public="20210119">CVE-2021-2007</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798587" id="1798587">CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835849" id="1835849">CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1835850" id="1835850">CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1839827" id="1839827">CVE-2020-13249 mariadb-connector-c: Improper validation of content in a OK packet received from server</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1922382" id="1922382">CVE-2021-2007 mysql: C API unspecified vulnerability (CPU Jan 2021)</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="mariadb-connector-c is earlier than 0:3.1.11-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205503001"/>
              <criterion comment="mariadb-connector-c is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205503002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-connector-c-config is earlier than 0:3.1.11-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205503003"/>
              <criterion comment="mariadb-connector-c-config is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205503004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mariadb-connector-c-devel is earlier than 0:3.1.11-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205503005"/>
              <criterion comment="mariadb-connector-c-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20205503006"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205506" version="639">
      <metadata>
        <title>ALSA-2020:5506: kernel-rt security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5506" ref_url="https://errata.almalinux.org/8/ALSA-2020-5506.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5506" ref_url="https://access.redhat.com/errata/RHSA-2020:5506" source="RHSA"/>
        <reference ref_id="CVE-2020-16166" ref_url="https://access.redhat.com/security/cve/CVE-2020-16166" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: information exposure in drivers/char/random.c and kernel/time/timer.c (CVE-2020-16166)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.3.z2 source tree (BZ#1894706)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-15"/>
          <updated date="2020-12-15"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-16166" impact="moderate" public="20200729">CVE-2020-16166</cve>
          <bugzilla href="https://bugzilla.redhat.com/1865751" id="1865751">CVE-2020-16166 kernel: information exposure in drivers/char/random.c and kernel/time/timer.c</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.8.1.rt7.62.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20205473047"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.8.1.rt7.62.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20205506026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-240.8.1.rt7.62.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205506023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205562" version="636">
      <metadata>
        <title>ALSA-2020:5562: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5562" ref_url="https://errata.almalinux.org/8/ALSA-2020-5562.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5562" ref_url="https://access.redhat.com/errata/RHSA-2020:5562" source="RHSA"/>
        <reference ref_id="CVE-2020-16042" ref_url="https://access.redhat.com/security/cve/CVE-2020-16042" source="CVE"/>
        <reference ref_id="CVE-2020-26971" ref_url="https://access.redhat.com/security/cve/CVE-2020-26971" source="CVE"/>
        <reference ref_id="CVE-2020-26973" ref_url="https://access.redhat.com/security/cve/CVE-2020-26973" source="CVE"/>
        <reference ref_id="CVE-2020-26974" ref_url="https://access.redhat.com/security/cve/CVE-2020-26974" source="CVE"/>
        <reference ref_id="CVE-2020-26978" ref_url="https://access.redhat.com/security/cve/CVE-2020-26978" source="CVE"/>
        <reference ref_id="CVE-2020-35111" ref_url="https://access.redhat.com/security/cve/CVE-2020-35111" source="CVE"/>
        <reference ref_id="CVE-2020-35113" ref_url="https://access.redhat.com/security/cve/CVE-2020-35113" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.6.0 ESR.

Security Fix(es):

* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042)

* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971)

* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973)

* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974)

* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113)

* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978)

* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-16"/>
          <updated date="2020-12-16"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-16042" impact="important" public="20201202">CVE-2020-16042</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-26971" impact="important" public="20201215">CVE-2020-26971</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-26973" impact="important" public="20201215">CVE-2020-26973</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26974" impact="important" public="20201215">CVE-2020-26974</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-26978" impact="moderate" public="20201215">CVE-2020-26978</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-35111" impact="low" public="20201215">CVE-2020-35111</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-35113" impact="important" public="20201215">CVE-2020-35113</cve>
          <bugzilla href="https://bugzilla.redhat.com/1904515" id="1904515">CVE-2020-16042 chromium-browser: Uninitialized Use in V8</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908022" id="1908022">CVE-2020-26971 Mozilla: Heap buffer overflow in WebGL</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908023" id="1908023">CVE-2020-26973 Mozilla: CSS Sanitizer performed incorrect sanitization</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908024" id="1908024">CVE-2020-26974 Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908025" id="1908025">CVE-2020-26978 Mozilla: Internal network hosts could have been probed by a malicious webpage</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908027" id="1908027">CVE-2020-35111 Mozilla: The proxy.onRequest API did not catch view-source URLs</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908029" id="1908029">CVE-2020-35113 Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.6.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205562001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205567" version="635">
      <metadata>
        <title>ALSA-2020:5567: postgresql:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5567" ref_url="https://errata.almalinux.org/8/ALSA-2020-5567.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5567" ref_url="https://access.redhat.com/errata/RHSA-2020:5567" source="RHSA"/>
        <reference ref_id="CVE-2020-25694" ref_url="https://access.redhat.com/security/cve/CVE-2020-25694" source="CVE"/>
        <reference ref_id="CVE-2020-25695" ref_url="https://access.redhat.com/security/cve/CVE-2020-25695" source="CVE"/>
        <reference ref_id="CVE-2020-25696" ref_url="https://access.redhat.com/security/cve/CVE-2020-25696" source="CVE"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

The following packages have been upgraded to a later upstream version: postgresql (10.15).

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)

* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)

* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-16"/>
          <updated date="2020-12-16"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-25694" impact="important" public="20201112">CVE-2020-25694</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2020-25695" impact="important" public="20201112">CVE-2020-25695</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-183-&gt;CWE-270" href="https://access.redhat.com/security/cve/CVE-2020-25696" impact="moderate" public="20201112">CVE-2020-25696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1894423" id="1894423">CVE-2020-25694 postgresql: Reconnection can downgrade connection security settings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894425" id="1894425">CVE-2020-25695 postgresql: Multiple features escape "security restricted operation" sandbox</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894430" id="1894430">CVE-2020-25696 postgresql: psql's \gset allows overwriting specially treated variables</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module postgresql:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20203669027"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670011"/>
              <criterion comment="postgresql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670012"/>
              <criterion comment="postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670031"/>
              <criterion comment="postgresql-contrib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670032"/>
              <criterion comment="postgresql-contrib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670051"/>
              <criterion comment="postgresql-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670052"/>
              <criterion comment="postgresql-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670071"/>
              <criterion comment="postgresql-plperl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670072"/>
              <criterion comment="postgresql-plperl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670091"/>
              <criterion comment="postgresql-plpython3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670092"/>
              <criterion comment="postgresql-plpython3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670111"/>
              <criterion comment="postgresql-pltcl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670112"/>
              <criterion comment="postgresql-pltcl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670131"/>
              <criterion comment="postgresql-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670132"/>
              <criterion comment="postgresql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670151"/>
              <criterion comment="postgresql-server-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670152"/>
              <criterion comment="postgresql-server-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670171"/>
              <criterion comment="postgresql-static is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670172"/>
              <criterion comment="postgresql-static is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670191"/>
              <criterion comment="postgresql-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670192"/>
              <criterion comment="postgresql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670211"/>
              <criterion comment="postgresql-test-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670212"/>
              <criterion comment="postgresql-test-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670231"/>
              <criterion comment="postgresql-upgrade is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670232"/>
              <criterion comment="postgresql-upgrade is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade-devel is earlier than 0:10.15-1.module_el8.3.0+2030+1ca16b1f" test_ref="oval:org.almalinux.alsa:tst:202055670251"/>
              <criterion comment="postgresql-upgrade-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade-devel is earlier than 0:10.15-1.module_el8.3.0+619+dbc95fbc" test_ref="oval:org.almalinux.alsa:tst:202055670252"/>
              <criterion comment="postgresql-upgrade-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690262"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205619" version="635">
      <metadata>
        <title>ALSA-2020:5619: postgresql:9.6 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5619" ref_url="https://errata.almalinux.org/8/ALSA-2020-5619.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5619" ref_url="https://access.redhat.com/errata/RHSA-2020:5619" source="RHSA"/>
        <reference ref_id="CVE-2019-10130" ref_url="https://access.redhat.com/security/cve/CVE-2019-10130" source="CVE"/>
        <reference ref_id="CVE-2019-10208" ref_url="https://access.redhat.com/security/cve/CVE-2019-10208" source="CVE"/>
        <reference ref_id="CVE-2020-14350" ref_url="https://access.redhat.com/security/cve/CVE-2020-14350" source="CVE"/>
        <reference ref_id="CVE-2020-1720" ref_url="https://access.redhat.com/security/cve/CVE-2020-1720" source="CVE"/>
        <reference ref_id="CVE-2020-25694" ref_url="https://access.redhat.com/security/cve/CVE-2020-25694" source="CVE"/>
        <reference ref_id="CVE-2020-25695" ref_url="https://access.redhat.com/security/cve/CVE-2020-25695" source="CVE"/>
        <reference ref_id="CVE-2020-25696" ref_url="https://access.redhat.com/security/cve/CVE-2020-25696" source="CVE"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

The following packages have been upgraded to a later upstream version: postgresql (9.6.20).

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)

* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)

* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208)

* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)

* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)

* postgresql: Selectivity estimators bypass row security policies (CVE-2019-10130)

* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-17"/>
          <updated date="2020-12-17"/>
          <cve cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-284" href="https://access.redhat.com/security/cve/CVE-2019-10130" impact="low" public="20190509">CVE-2019-10130</cve>
          <cve cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2019-10208" impact="moderate" public="20190808">CVE-2019-10208</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14350" impact="moderate" public="20200813">CVE-2020-14350</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2020-1720" impact="low" public="20200213">CVE-2020-1720</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-25694" impact="important" public="20201112">CVE-2020-25694</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2020-25695" impact="important" public="20201112">CVE-2020-25695</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-183-&gt;CWE-270" href="https://access.redhat.com/security/cve/CVE-2020-25696" impact="moderate" public="20201112">CVE-2020-25696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1707109" id="1707109">CVE-2019-10130 postgresql: Selectivity estimators bypass row security policies</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1734416" id="1734416">CVE-2019-10208 postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1798852" id="1798852">CVE-2020-1720 postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865746" id="1865746">CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE EXTENSION</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894423" id="1894423">CVE-2020-25694 postgresql: Reconnection can downgrade connection security settings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894425" id="1894425">CVE-2020-25695 postgresql: Multiple features escape "security restricted operation" sandbox</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894430" id="1894430">CVE-2020-25696 postgresql: psql's \gset allows overwriting specially treated variables</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module postgresql:9.6 is enabled" test_ref="oval:org.almalinux.alsa:tst:20205619023"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190011"/>
              <criterion comment="postgresql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190012"/>
              <criterion comment="postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190031"/>
              <criterion comment="postgresql-contrib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190032"/>
              <criterion comment="postgresql-contrib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190051"/>
              <criterion comment="postgresql-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190052"/>
              <criterion comment="postgresql-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190071"/>
              <criterion comment="postgresql-plperl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190072"/>
              <criterion comment="postgresql-plperl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190091"/>
              <criterion comment="postgresql-plpython3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190092"/>
              <criterion comment="postgresql-plpython3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190111"/>
              <criterion comment="postgresql-pltcl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190112"/>
              <criterion comment="postgresql-pltcl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190131"/>
              <criterion comment="postgresql-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190132"/>
              <criterion comment="postgresql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190151"/>
              <criterion comment="postgresql-server-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190152"/>
              <criterion comment="postgresql-server-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190171"/>
              <criterion comment="postgresql-static is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190172"/>
              <criterion comment="postgresql-static is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190191"/>
              <criterion comment="postgresql-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190192"/>
              <criterion comment="postgresql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:9.6.20-1.module_el8.3.0+2029+7f0e88b6" test_ref="oval:org.almalinux.alsa:tst:202056190211"/>
              <criterion comment="postgresql-test-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:9.6.20-1.module_el8.3.0+611+a14cc989" test_ref="oval:org.almalinux.alsa:tst:202056190212"/>
              <criterion comment="postgresql-test-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690222"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205620" version="635">
      <metadata>
        <title>ALSA-2020:5620: postgresql:12 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5620" ref_url="https://errata.almalinux.org/8/ALSA-2020-5620.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5620" ref_url="https://access.redhat.com/errata/RHSA-2020:5620" source="RHSA"/>
        <reference ref_id="CVE-2020-14349" ref_url="https://access.redhat.com/security/cve/CVE-2020-14349" source="CVE"/>
        <reference ref_id="CVE-2020-14350" ref_url="https://access.redhat.com/security/cve/CVE-2020-14350" source="CVE"/>
        <reference ref_id="CVE-2020-1720" ref_url="https://access.redhat.com/security/cve/CVE-2020-1720" source="CVE"/>
        <reference ref_id="CVE-2020-25694" ref_url="https://access.redhat.com/security/cve/CVE-2020-25694" source="CVE"/>
        <reference ref_id="CVE-2020-25695" ref_url="https://access.redhat.com/security/cve/CVE-2020-25695" source="CVE"/>
        <reference ref_id="CVE-2020-25696" ref_url="https://access.redhat.com/security/cve/CVE-2020-25696" source="CVE"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

The following packages have been upgraded to a later upstream version: postgresql (12.5).

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694)

* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695)

* postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349)

* postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350)

* postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696)

* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-17"/>
          <updated date="2020-12-17"/>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14349" impact="moderate" public="20200813">CVE-2020-14349</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14350" impact="moderate" public="20200813">CVE-2020-14350</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2020-1720" impact="low" public="20200213">CVE-2020-1720</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-25694" impact="important" public="20201112">CVE-2020-25694</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://access.redhat.com/security/cve/CVE-2020-25695" impact="important" public="20201112">CVE-2020-25695</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-183-&gt;CWE-270" href="https://access.redhat.com/security/cve/CVE-2020-25696" impact="moderate" public="20201112">CVE-2020-25696</cve>
          <bugzilla href="https://bugzilla.redhat.com/1798852" id="1798852">CVE-2020-1720 postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865744" id="1865744">CVE-2020-14349 postgresql: Uncontrolled search path element in logical replication</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1865746" id="1865746">CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE EXTENSION</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894423" id="1894423">CVE-2020-25694 postgresql: Reconnection can downgrade connection security settings</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894425" id="1894425">CVE-2020-25695 postgresql: Multiple features escape "security restricted operation" sandbox</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894430" id="1894430">CVE-2020-25696 postgresql: psql's \gset allows overwriting specially treated variables</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module postgresql:12 is enabled" test_ref="oval:org.almalinux.alsa:tst:20205620031"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="pgaudit is earlier than 0:1.4.0-4.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200011"/>
              <criterion comment="pgaudit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20205620002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pgaudit is earlier than 0:1.4.0-4.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200012"/>
              <criterion comment="pgaudit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202056200022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgres-decoderbufs is earlier than 0:0.10.0-2.module_el8.5.0+2606+4554acc4" test_ref="oval:org.almalinux.alsa:tst:202056200031"/>
              <criterion comment="postgres-decoderbufs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20205620004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgres-decoderbufs is earlier than 0:0.10.0-2.module_el8.5.0+247+83f2b2cf" test_ref="oval:org.almalinux.alsa:tst:202056200032"/>
              <criterion comment="postgres-decoderbufs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20205620004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200051"/>
              <criterion comment="postgresql is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200052"/>
              <criterion comment="postgresql is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200071"/>
              <criterion comment="postgresql-contrib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-contrib is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200072"/>
              <criterion comment="postgresql-contrib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200091"/>
              <criterion comment="postgresql-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-docs is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200092"/>
              <criterion comment="postgresql-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200111"/>
              <criterion comment="postgresql-plperl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plperl is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200112"/>
              <criterion comment="postgresql-plperl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200131"/>
              <criterion comment="postgresql-plpython3 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-plpython3 is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200132"/>
              <criterion comment="postgresql-plpython3 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200151"/>
              <criterion comment="postgresql-pltcl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-pltcl is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200152"/>
              <criterion comment="postgresql-pltcl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690122"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200171"/>
              <criterion comment="postgresql-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200172"/>
              <criterion comment="postgresql-server is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690142"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200191"/>
              <criterion comment="postgresql-server-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-server-devel is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200192"/>
              <criterion comment="postgresql-server-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200211"/>
              <criterion comment="postgresql-static is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-static is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200212"/>
              <criterion comment="postgresql-static is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200231"/>
              <criterion comment="postgresql-test is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200232"/>
              <criterion comment="postgresql-test is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200251"/>
              <criterion comment="postgresql-test-rpm-macros is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669022"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-test-rpm-macros is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200252"/>
              <criterion comment="postgresql-test-rpm-macros is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690222"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200271"/>
              <criterion comment="postgresql-upgrade is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200272"/>
              <criterion comment="postgresql-upgrade is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade-devel is earlier than 0:12.5-1.module_el8.3.0+2046+664538f4" test_ref="oval:org.almalinux.alsa:tst:202056200291"/>
              <criterion comment="postgresql-upgrade-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203669026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="postgresql-upgrade-devel is earlier than 0:12.5-1.module_el8.3.0+620+f1abd701" test_ref="oval:org.almalinux.alsa:tst:202056200292"/>
              <criterion comment="postgresql-upgrade-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202036690262"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20205624" version="635">
      <metadata>
        <title>ALSA-2020:5624: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2020:5624" ref_url="https://errata.almalinux.org/8/ALSA-2020-5624.html" source="ALSA"/>
        <reference ref_id="RHSA-2020:5624" ref_url="https://access.redhat.com/errata/RHSA-2020:5624" source="RHSA"/>
        <reference ref_id="CVE-2020-16042" ref_url="https://access.redhat.com/security/cve/CVE-2020-16042" source="CVE"/>
        <reference ref_id="CVE-2020-26971" ref_url="https://access.redhat.com/security/cve/CVE-2020-26971" source="CVE"/>
        <reference ref_id="CVE-2020-26973" ref_url="https://access.redhat.com/security/cve/CVE-2020-26973" source="CVE"/>
        <reference ref_id="CVE-2020-26974" ref_url="https://access.redhat.com/security/cve/CVE-2020-26974" source="CVE"/>
        <reference ref_id="CVE-2020-26978" ref_url="https://access.redhat.com/security/cve/CVE-2020-26978" source="CVE"/>
        <reference ref_id="CVE-2020-35111" ref_url="https://access.redhat.com/security/cve/CVE-2020-35111" source="CVE"/>
        <reference ref_id="CVE-2020-35113" ref_url="https://access.redhat.com/security/cve/CVE-2020-35113" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.6.0.

Security Fix(es):

* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042)

* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971)

* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973)

* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974)

* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113)

* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978)

* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2020 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2020-12-17"/>
          <updated date="2020-12-17"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-16042" impact="important" public="20201202">CVE-2020-16042</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-26971" impact="important" public="20201215">CVE-2020-26971</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-26973" impact="important" public="20201215">CVE-2020-26973</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-26974" impact="important" public="20201215">CVE-2020-26974</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-26978" impact="moderate" public="20201215">CVE-2020-26978</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-35111" impact="low" public="20201215">CVE-2020-35111</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2020-35113" impact="important" public="20201215">CVE-2020-35113</cve>
          <bugzilla href="https://bugzilla.redhat.com/1904515" id="1904515">CVE-2020-16042 chromium-browser: Uninitialized Use in V8</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908022" id="1908022">CVE-2020-26971 Mozilla: Heap buffer overflow in WebGL</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908023" id="1908023">CVE-2020-26973 Mozilla: CSS Sanitizer performed incorrect sanitization</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908024" id="1908024">CVE-2020-26974 Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908025" id="1908025">CVE-2020-26978 Mozilla: Internal network hosts could have been probed by a malicious webpage</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908027" id="1908027">CVE-2020-35111 Mozilla: The proxy.onRequest API did not catch view-source URLs</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1908029" id="1908029">CVE-2020-35113 Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.6.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20205624001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210003" version="637">
      <metadata>
        <title>ALSA-2021:0003: kernel security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0003" ref_url="https://errata.almalinux.org/8/ALSA-2021-0003.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0003" ref_url="https://access.redhat.com/errata/RHSA-2021:0003" source="RHSA"/>
        <reference ref_id="CVE-2020-25211" ref_url="https://access.redhat.com/security/cve/CVE-2020-25211" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* avoid flush_backlog IPI for isolated CPUs by configuring RPS cpumask (BZ#1883314)

* rngd consumes 100% cpu on rhel-8.3 system in fips mode (BZ#1886192)

* RHEL8.1 - Random memory corruption may occur due to incorrect tlbflush (BZ#1899208)

* fips mode boot is broken after adding extrng (BZ#1899584)

* pmtu of 1280 for vxlan as bridge port won't work (BZ#1902082)

* rpc task loop with kworker spinning at 100% CPU for 10 minutes when umount an NFS 4.x share with sec=krb5 triggered by unmount of the NFS share (BZ#1907667)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-04"/>
          <updated date="2021-01-04"/>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-25211" impact="important" public="20200909">CVE-2020-25211</cve>
          <bugzilla href="https://bugzilla.redhat.com/1877571" id="1877571">CVE-2020-25211 kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-240.10.1.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20210003047"/>
            <criterion comment="kernel earlier than 0:4.18.0-240.10.1.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20210003048"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003009"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003011"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003013"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003015"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003017"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003019"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003021"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003023"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003025"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003027"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003029"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003031"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003033"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003035"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003037"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003039"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003041"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003043"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-240.10.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210003045"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210004" version="636">
      <metadata>
        <title>ALSA-2021:0004: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0004" ref_url="https://errata.almalinux.org/8/ALSA-2021-0004.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0004" ref_url="https://access.redhat.com/errata/RHSA-2021:0004" source="RHSA"/>
        <reference ref_id="CVE-2020-25211" ref_url="https://access.redhat.com/security/cve/CVE-2020-25211" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.3.z source tree (BZ#1906140)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-04"/>
          <updated date="2021-01-04"/>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-25211" impact="important" public="20200909">CVE-2020-25211</cve>
          <bugzilla href="https://bugzilla.redhat.com/1877571" id="1877571">CVE-2020-25211 kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.10.1.rt7.64.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20210003047"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.10.1.rt7.64.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20210004026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-240.10.1.rt7.64.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210004023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210052" version="635">
      <metadata>
        <title>ALSA-2021:0052: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0052" ref_url="https://errata.almalinux.org/8/ALSA-2021-0052.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0052" ref_url="https://access.redhat.com/errata/RHSA-2021:0052" source="RHSA"/>
        <reference ref_id="CVE-2020-16044" ref_url="https://access.redhat.com/security/cve/CVE-2020-16044" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.6.1 ESR.

Security Fix(es):

* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-11"/>
          <updated date="2021-01-11"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-16044" impact="critical" public="20210106">CVE-2020-16044</cve>
          <bugzilla href="https://bugzilla.redhat.com/1913503" id="1913503">CVE-2020-16044 Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.6.1-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210052001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210089" version="634">
      <metadata>
        <title>ALSA-2021:0089: thunderbird security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0089" ref_url="https://errata.almalinux.org/8/ALSA-2021-0089.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0089" ref_url="https://access.redhat.com/errata/RHSA-2021:0089" source="RHSA"/>
        <reference ref_id="CVE-2020-16044" ref_url="https://access.redhat.com/security/cve/CVE-2020-16044" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.6.1.

Security Fix(es):

* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-13"/>
          <updated date="2021-01-13"/>
          <cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-16044" impact="critical" public="20210106">CVE-2020-16044</cve>
          <bugzilla href="https://bugzilla.redhat.com/1913503" id="1913503">CVE-2020-16044 Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.6.1-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210089001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210094" version="638">
      <metadata>
        <title>ALSA-2021:0094: dotnet5.0 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0094" ref_url="https://errata.almalinux.org/8/ALSA-2021-0094.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0094" ref_url="https://access.redhat.com/errata/RHSA-2021:0094" source="RHSA"/>
        <reference ref_id="CVE-2021-1723" ref_url="https://access.redhat.com/security/cve/CVE-2021-1723" source="CVE"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 5.0.102 and .NET Runtime 5.0.2.

Security Fix(es):

* dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2 (CVE-2021-1723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-13"/>
          <updated date="2021-01-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-833" href="https://access.redhat.com/security/cve/CVE-2021-1723" impact="important" public="20210112:1700">CVE-2021-1723</cve>
          <bugzilla href="https://bugzilla.redhat.com/1914258" id="1914258">CVE-2021-1723 dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094001"/>
              <criterion comment="aspnetcore-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094003"/>
              <criterion comment="aspnetcore-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:5.0.102-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094007"/>
              <criterion comment="dotnet-apphost-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094011"/>
              <criterion comment="dotnet-hostfxr-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094013"/>
              <criterion comment="dotnet-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-5.0 is earlier than 0:5.0.102-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094015"/>
              <criterion comment="dotnet-sdk-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-5.0 is earlier than 0:5.0.2-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094017"/>
              <criterion comment="dotnet-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-5.0 is earlier than 0:5.0.102-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094019"/>
              <criterion comment="dotnet-templates-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:5.0.102-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210094021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210095" version="639">
      <metadata>
        <title>ALSA-2021:0095: dotnet3.1 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0095" ref_url="https://errata.almalinux.org/8/ALSA-2021-0095.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0095" ref_url="https://access.redhat.com/errata/RHSA-2021:0095" source="RHSA"/>
        <reference ref_id="CVE-2021-1723" ref_url="https://access.redhat.com/security/cve/CVE-2021-1723" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.111 and .NET Core Runtime 3.1.11.

Security Fix(es):

* dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2 (CVE-2021-1723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-13"/>
          <updated date="2021-01-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-833" href="https://access.redhat.com/security/cve/CVE-2021-1723" impact="important" public="20210112:1700">CVE-2021-1723</cve>
          <bugzilla href="https://bugzilla.redhat.com/1914258" id="1914258">CVE-2021-1723 dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095005"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095007"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095009"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.111-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095011"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.11-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095013"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.111-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210095015"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210150" version="637">
      <metadata>
        <title>ALSA-2021:0150: dnsmasq security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0150" ref_url="https://errata.almalinux.org/8/ALSA-2021-0150.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0150" ref_url="https://access.redhat.com/errata/RHSA-2021:0150" source="RHSA"/>
        <reference ref_id="CVE-2020-25681" ref_url="https://access.redhat.com/security/cve/CVE-2020-25681" source="CVE"/>
        <reference ref_id="CVE-2020-25682" ref_url="https://access.redhat.com/security/cve/CVE-2020-25682" source="CVE"/>
        <reference ref_id="CVE-2020-25683" ref_url="https://access.redhat.com/security/cve/CVE-2020-25683" source="CVE"/>
        <reference ref_id="CVE-2020-25684" ref_url="https://access.redhat.com/security/cve/CVE-2020-25684" source="CVE"/>
        <reference ref_id="CVE-2020-25685" ref_url="https://access.redhat.com/security/cve/CVE-2020-25685" source="CVE"/>
        <reference ref_id="CVE-2020-25686" ref_url="https://access.redhat.com/security/cve/CVE-2020-25686" source="CVE"/>
        <reference ref_id="CVE-2020-25687" ref_url="https://access.redhat.com/security/cve/CVE-2020-25687" source="CVE"/>
        <description>The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)

* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)

* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)

* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)

* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)

* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)

* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-19"/>
          <updated date="2021-01-19"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-25681" impact="important" public="20210119">CVE-2020-25681</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-25682" impact="important" public="20210119">CVE-2020-25682</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-25683" impact="moderate" public="20210119">CVE-2020-25683</cve>
          <cve cvss3="4.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-25684" impact="moderate" public="20210119">CVE-2020-25684</cve>
          <cve cvss3="4.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cwe="CWE-358" href="https://access.redhat.com/security/cve/CVE-2020-25685" impact="moderate" public="20210119">CVE-2020-25685</cve>
          <cve cvss3="4.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cwe="CWE-290" href="https://access.redhat.com/security/cve/CVE-2020-25686" impact="moderate" public="20210119">CVE-2020-25686</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-25687" impact="moderate" public="20210119">CVE-2020-25687</cve>
          <bugzilla href="https://bugzilla.redhat.com/1881875" id="1881875">CVE-2020-25681 dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1882014" id="1882014">CVE-2020-25682 dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1882018" id="1882018">CVE-2020-25683 dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889686" id="1889686">CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889688" id="1889688">CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1890125" id="1890125">CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1891568" id="1891568">CVE-2020-25687 dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dnsmasq is earlier than 0:2.79-13.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210150001"/>
              <criterion comment="dnsmasq is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201715002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dnsmasq-utils is earlier than 0:2.79-13.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210150003"/>
              <criterion comment="dnsmasq-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20201715004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210218" version="635">
      <metadata>
        <title>ALSA-2021:0218: sudo security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0218" ref_url="https://errata.almalinux.org/8/ALSA-2021-0218.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0218" ref_url="https://access.redhat.com/errata/RHSA-2021:0218" source="RHSA"/>
        <reference ref_id="CVE-2021-3156" ref_url="https://access.redhat.com/security/cve/CVE-2021-3156" source="CVE"/>
        <description>The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

Security Fix(es):

* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-26"/>
          <updated date="2021-01-26"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://access.redhat.com/security/cve/CVE-2021-3156" impact="important" public="20210126:1800">CVE-2021-3156</cve>
          <bugzilla href="https://bugzilla.redhat.com/1917684" id="1917684">CVE-2021-3156 sudo: Heap buffer overflow in argument parsing</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="sudo is earlier than 0:1.8.29-6.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210218001"/>
          <criterion comment="sudo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20193694002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210288" version="636">
      <metadata>
        <title>ALSA-2021:0288: firefox security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0288" ref_url="https://errata.almalinux.org/8/ALSA-2021-0288.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0288" ref_url="https://access.redhat.com/errata/RHSA-2021:0288" source="RHSA"/>
        <reference ref_id="CVE-2020-26976" ref_url="https://access.redhat.com/security/cve/CVE-2020-26976" source="CVE"/>
        <reference ref_id="CVE-2021-23953" ref_url="https://access.redhat.com/security/cve/CVE-2021-23953" source="CVE"/>
        <reference ref_id="CVE-2021-23954" ref_url="https://access.redhat.com/security/cve/CVE-2021-23954" source="CVE"/>
        <reference ref_id="CVE-2021-23960" ref_url="https://access.redhat.com/security/cve/CVE-2021-23960" source="CVE"/>
        <reference ref_id="CVE-2021-23964" ref_url="https://access.redhat.com/security/cve/CVE-2021-23964" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.7.0 ESR.

Security Fix(es):

* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953)

* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954)

* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964)

* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976)

* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-27"/>
          <updated date="2021-01-27"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-26976" impact="moderate" public="20210126">CVE-2020-26976</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2021-23953" impact="important" public="20210126">CVE-2021-23953</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2021-23954" impact="important" public="20210126">CVE-2021-23954</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-626" href="https://access.redhat.com/security/cve/CVE-2021-23960" impact="moderate" public="20210126">CVE-2021-23960</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2021-23964" impact="important" public="20210126">CVE-2021-23964</cve>
          <bugzilla href="https://bugzilla.redhat.com/1920646" id="1920646">CVE-2021-23953 Mozilla: Cross-origin information leakage via redirected PDF requests</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920648" id="1920648">CVE-2021-23954 Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920649" id="1920649">CVE-2020-26976 Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920650" id="1920650">CVE-2021-23960 Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920651" id="1920651">CVE-2021-23964 Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.7.0-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210288001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210298" version="637">
      <metadata>
        <title>ALSA-2021:0298: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0298" ref_url="https://errata.almalinux.org/8/ALSA-2021-0298.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0298" ref_url="https://access.redhat.com/errata/RHSA-2021:0298" source="RHSA"/>
        <reference ref_id="CVE-2020-15685" ref_url="https://access.redhat.com/security/cve/CVE-2020-15685" source="CVE"/>
        <reference ref_id="CVE-2020-26976" ref_url="https://access.redhat.com/security/cve/CVE-2020-26976" source="CVE"/>
        <reference ref_id="CVE-2021-23953" ref_url="https://access.redhat.com/security/cve/CVE-2021-23953" source="CVE"/>
        <reference ref_id="CVE-2021-23954" ref_url="https://access.redhat.com/security/cve/CVE-2021-23954" source="CVE"/>
        <reference ref_id="CVE-2021-23960" ref_url="https://access.redhat.com/security/cve/CVE-2021-23960" source="CVE"/>
        <reference ref_id="CVE-2021-23964" ref_url="https://access.redhat.com/security/cve/CVE-2021-23964" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.7.0.

Security Fix(es):

* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953)

* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954)

* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964)

* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685)

* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976)

* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-01-28"/>
          <updated date="2021-01-28"/>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-924" href="https://access.redhat.com/security/cve/CVE-2020-15685" impact="moderate" public="20210126">CVE-2020-15685</cve>
          <cve cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-26976" impact="moderate" public="20210126">CVE-2020-26976</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-829" href="https://access.redhat.com/security/cve/CVE-2021-23953" impact="important" public="20210126">CVE-2021-23953</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://access.redhat.com/security/cve/CVE-2021-23954" impact="important" public="20210126">CVE-2021-23954</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-626" href="https://access.redhat.com/security/cve/CVE-2021-23960" impact="moderate" public="20210126">CVE-2021-23960</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2021-23964" impact="important" public="20210126">CVE-2021-23964</cve>
          <bugzilla href="https://bugzilla.redhat.com/1920646" id="1920646">CVE-2021-23953 Mozilla: Cross-origin information leakage via redirected PDF requests</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920648" id="1920648">CVE-2021-23954 Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920649" id="1920649">CVE-2020-26976 Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920650" id="1920650">CVE-2021-23960 Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1920651" id="1920651">CVE-2021-23964 Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1921543" id="1921543">CVE-2020-15685 Mozilla: IMAP Response Injection when using STARTTLS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.7.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210298001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210304" version="637">
      <metadata>
        <title>ALSA-2021:0304: flatpak security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0304" ref_url="https://errata.almalinux.org/8/ALSA-2021-0304.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0304" ref_url="https://access.redhat.com/errata/RHSA-2021:0304" source="RHSA"/>
        <reference ref_id="CVE-2021-21261" ref_url="https://access.redhat.com/security/cve/CVE-2021-21261" source="CVE"/>
        <description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

Security Fix(es):

* flatpak: sandbox escape via spawn portal (CVE-2021-21261)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-01"/>
          <updated date="2021-02-01"/>
          <cve cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-77" href="https://access.redhat.com/security/cve/CVE-2021-21261" impact="important" public="20210114">CVE-2021-21261</cve>
          <bugzilla href="https://bugzilla.redhat.com/1917430" id="1917430">CVE-2021-21261 flatpak: sandbox escape via spawn portal</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="flatpak is earlier than 0:1.6.2-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210304001"/>
              <criterion comment="flatpak is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191143002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="flatpak-libs is earlier than 0:1.6.2-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210304003"/>
              <criterion comment="flatpak-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191143004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="flatpak-selinux is earlier than 0:1.6.2-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210304005"/>
              <criterion comment="flatpak-selinux is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210304006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="flatpak-session-helper is earlier than 0:1.6.2-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210304007"/>
              <criterion comment="flatpak-session-helper is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210304008"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210471" version="639">
      <metadata>
        <title>ALSA-2021:0471: dotnet3.1 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0471" ref_url="https://errata.almalinux.org/8/ALSA-2021-0471.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0471" ref_url="https://access.redhat.com/errata/RHSA-2021:0471" source="RHSA"/>
        <reference ref_id="CVE-2021-1721" ref_url="https://access.redhat.com/security/cve/CVE-2021-1721" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.112 and .NET Core Runtime 3.1.12.

Security Fix(es):

* dotnet: certificate chain building recursion Denial of Service (CVE-2021-1721)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-10"/>
          <updated date="2021-02-10"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://access.redhat.com/security/cve/CVE-2021-1721" impact="important" public="20210209:1852">CVE-2021-1721</cve>
          <bugzilla href="https://bugzilla.redhat.com/1926918" id="1926918">CVE-2021-1721 dotnet: certificate chain building recursion Denial of Service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471005"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471007"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471009"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.112-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471011"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.12-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471013"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.112-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210471015"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210474" version="638">
      <metadata>
        <title>ALSA-2021:0474: dotnet security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0474" ref_url="https://errata.almalinux.org/8/ALSA-2021-0474.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0474" ref_url="https://access.redhat.com/errata/RHSA-2021:0474" source="RHSA"/>
        <reference ref_id="CVE-2021-1721" ref_url="https://access.redhat.com/security/cve/CVE-2021-1721" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 2.1.521 and .NET Core Runtime 2.1.25.

Security Fix(es):

* dotnet: certificate chain building recursion Denial of Service (CVE-2021-1721)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-10"/>
          <updated date="2021-02-10"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://access.redhat.com/security/cve/CVE-2021-1721" impact="important" public="20210209:1852">CVE-2021-1721</cve>
          <bugzilla href="https://bugzilla.redhat.com/1926918" id="1926918">CVE-2021-1721 dotnet: certificate chain building recursion Denial of Service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.25-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210474001"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.25-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210474003"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.521-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210474005"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.521-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210474007"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210476" version="640">
      <metadata>
        <title>ALSA-2021:0476: dotnet5.0 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0476" ref_url="https://errata.almalinux.org/8/ALSA-2021-0476.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0476" ref_url="https://access.redhat.com/errata/RHSA-2021:0476" source="RHSA"/>
        <reference ref_id="CVE-2021-1721" ref_url="https://access.redhat.com/security/cve/CVE-2021-1721" source="CVE"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 5.0.103 and .NET Runtime 5.0.3.

Security Fix(es):

* dotnet: certificate chain building recursion Denial of Service (CVE-2021-1721)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-10"/>
          <updated date="2021-02-10"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://access.redhat.com/security/cve/CVE-2021-1721" impact="important" public="20210209:1852">CVE-2021-1721</cve>
          <bugzilla href="https://bugzilla.redhat.com/1926918" id="1926918">CVE-2021-1721 dotnet: certificate chain building recursion Denial of Service</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476001"/>
              <criterion comment="aspnetcore-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476003"/>
              <criterion comment="aspnetcore-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:5.0.103-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476007"/>
              <criterion comment="dotnet-apphost-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476011"/>
              <criterion comment="dotnet-hostfxr-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476013"/>
              <criterion comment="dotnet-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-5.0 is earlier than 0:5.0.103-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476015"/>
              <criterion comment="dotnet-sdk-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-5.0 is earlier than 0:5.0.3-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476017"/>
              <criterion comment="dotnet-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-5.0 is earlier than 0:5.0.103-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476019"/>
              <criterion comment="dotnet-templates-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:5.0.103-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210476021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210507" version="636">
      <metadata>
        <title>ALSA-2021:0507: subversion:1.10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0507" ref_url="https://errata.almalinux.org/8/ALSA-2021-0507.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0507" ref_url="https://access.redhat.com/errata/RHSA-2021:0507" source="RHSA"/>
        <reference ref_id="CVE-2020-17525" ref_url="https://access.redhat.com/security/cve/CVE-2020-17525" source="CVE"/>
        <description>Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.

Security Fix(es):

* subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-15"/>
          <updated date="2021-02-15"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-17525" impact="important" public="20210210:1200">CVE-2020-17525</cve>
          <bugzilla href="https://bugzilla.redhat.com/1922303" id="1922303">CVE-2020-17525 subversion: Remote unauthenticated denial of service in mod_authz_svn</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module subversion:1.10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192512021"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120011"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120012"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libserf is earlier than 0:1.3.9-9.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202047120013"/>
              <criterion comment="libserf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_dav_svn is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070031"/>
              <criterion comment="mod_dav_svn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_dav_svn is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070032"/>
              <criterion comment="mod_dav_svn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="mod_dav_svn is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070033"/>
              <criterion comment="mod_dav_svn is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070051"/>
              <criterion comment="subversion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070052"/>
              <criterion comment="subversion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070053"/>
              <criterion comment="subversion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-devel is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070071"/>
              <criterion comment="subversion-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-devel is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070072"/>
              <criterion comment="subversion-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-devel is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070073"/>
              <criterion comment="subversion-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-gnome is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070091"/>
              <criterion comment="subversion-gnome is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-gnome is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070092"/>
              <criterion comment="subversion-gnome is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-gnome is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070093"/>
              <criterion comment="subversion-gnome is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-javahl is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070111"/>
              <criterion comment="subversion-javahl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512012"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-javahl is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070112"/>
              <criterion comment="subversion-javahl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512012"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-libs is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070131"/>
              <criterion comment="subversion-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-libs is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070132"/>
              <criterion comment="subversion-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-libs is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070133"/>
              <criterion comment="subversion-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-perl is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070151"/>
              <criterion comment="subversion-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-perl is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070152"/>
              <criterion comment="subversion-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-perl is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070153"/>
              <criterion comment="subversion-perl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-tools is earlier than 0:1.10.2-4.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070171"/>
              <criterion comment="subversion-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-tools is earlier than 0:1.10.2-4.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202105070172"/>
              <criterion comment="subversion-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="subversion-tools is earlier than 0:1.10.2-4.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202105070173"/>
              <criterion comment="subversion-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.3.0+2053+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120191"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.4.0+2266+ac338b6d" test_ref="oval:org.almalinux.alsa:tst:202047120192"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="utf8proc is earlier than 0:2.1.1-5.module_el8.5.0+73+aa7e29ed" test_ref="oval:org.almalinux.alsa:tst:202047120193"/>
              <criterion comment="utf8proc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20192512020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210530" version="635">
      <metadata>
        <title>ALSA-2021:0530: java-1.8.0-ibm security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0530" ref_url="https://errata.almalinux.org/8/ALSA-2021-0530.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0530" ref_url="https://access.redhat.com/errata/RHSA-2021:0530" source="RHSA"/>
        <reference ref_id="CVE-2020-14779" ref_url="https://access.redhat.com/security/cve/CVE-2020-14779" source="CVE"/>
        <reference ref_id="CVE-2020-14796" ref_url="https://access.redhat.com/security/cve/CVE-2020-14796" source="CVE"/>
        <reference ref_id="CVE-2020-14797" ref_url="https://access.redhat.com/security/cve/CVE-2020-14797" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP20.

Security Fix(es):

* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)

* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)

* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-770" href="https://access.redhat.com/security/cve/CVE-2020-14779" impact="low" public="20201020">CVE-2020-14779</cve>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://access.redhat.com/security/cve/CVE-2020-14796" impact="low" public="20201020">CVE-2020-14796</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2020-14797" impact="moderate" public="20201020">CVE-2020-14797</cve>
          <bugzilla href="https://bugzilla.redhat.com/1889271" id="1889271">CVE-2020-14779 OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889697" id="1889697">CVE-2020-14796 OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889717" id="1889717">CVE-2020-14797 OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.20-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210530015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210531" version="636">
      <metadata>
        <title>ALSA-2021:0531: container-tools:rhel8 security, bug fix, and enhancement update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0531" ref_url="https://errata.almalinux.org/8/ALSA-2021-0531.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0531" ref_url="https://access.redhat.com/errata/RHSA-2021:0531" source="RHSA"/>
        <reference ref_id="CVE-2020-14370" ref_url="https://access.redhat.com/security/cve/CVE-2020-14370" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2020-14370" impact="moderate" public="20200922">CVE-2020-14370</cve>
          <bugzilla href="https://bugzilla.redhat.com/1874268" id="1874268">CVE-2020-14370 podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:rhel8 is enabled" test_ref="oval:org.almalinux.alsa:tst:20190975025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.16.7-4.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310011"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.16.7-4.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310012"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.16.7-4.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310031"/>
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.16.7-4.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310032"/>
              <criterion comment="buildah-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:27.1-3.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310051"/>
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:27.1-3.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310052"/>
              <criterion comment="cockpit-podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030062"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.22-3.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310071"/>
              <criterion comment="conmon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.22-3.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310072"/>
              <criterion comment="conmon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.155.0-1.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310091"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.155.0-1.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310092"/>
              <criterion comment="container-selinux is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750042"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.9.0-1.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310111"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.9.0-1.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310112"/>
              <criterion comment="containernetworking-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750062"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:1.2.0-9.module_el8.3.0+2067+68fb1526.alma.1" test_ref="oval:org.almalinux.alsa:tst:202105310131"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:1.2.0-9.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310132"/>
              <criterion comment="containers-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.15-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310151"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.15-1.module_el8.4.0+641+6116a774" test_ref="oval:org.almalinux.alsa:tst:202105310152"/>
              <criterion comment="crit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.15-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310171"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.15-1.module_el8.4.0+641+6116a774" test_ref="oval:org.almalinux.alsa:tst:202105310172"/>
              <criterion comment="criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500182"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crun is earlier than 0:0.16-2.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310191"/>
              <criterion comment="crun is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crun is earlier than 0:0.16-2.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310192"/>
              <criterion comment="crun is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046940202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:1.3.0-2.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310211"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:1.3.0-2.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310212"/>
              <criterion comment="fuse-overlayfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750102"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp is earlier than 0:4.3.1-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310231"/>
              <criterion comment="libslirp is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp is earlier than 0:4.3.1-1.module_el8.4.0+575+63b40ad7" test_ref="oval:org.almalinux.alsa:tst:202105310232"/>
              <criterion comment="libslirp is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202030530222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp-devel is earlier than 0:4.3.1-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310251"/>
              <criterion comment="libslirp-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20203053024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="libslirp-devel is earlier than 0:4.3.1-1.module_el8.4.0+575+63b40ad7" test_ref="oval:org.almalinux.alsa:tst:202105310252"/>
              <criterion comment="libslirp-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202030530242"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-seccomp-bpf-hook is earlier than 0:1.2.0-1.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310271"/>
              <criterion comment="oci-seccomp-bpf-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-seccomp-bpf-hook is earlier than 0:1.2.0-1.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310272"/>
              <criterion comment="oci-seccomp-bpf-hook is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046940282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310291"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310292"/>
              <criterion comment="podman is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750162"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-catatonit is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310311"/>
              <criterion comment="podman-catatonit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204694032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-catatonit is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310312"/>
              <criterion comment="podman-catatonit is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202046940322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310331"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310332"/>
              <criterion comment="podman-docker is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750182"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-plugins is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310351"/>
              <criterion comment="podman-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20210531036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-plugins is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310352"/>
              <criterion comment="podman-plugins is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202105310362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310371"/>
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310372"/>
              <criterion comment="podman-remote is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030262"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:2.2.1-7.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310391"/>
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:2.2.1-7.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310392"/>
              <criterion comment="podman-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030282"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+2046+68fb1526" test_ref="oval:org.almalinux.alsa:tst:202105310411"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.3.0+475+c50ce30b" test_ref="oval:org.almalinux.alsa:tst:202105310412"/>
              <criterion comment="python-podman-api is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030302"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.15-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310431"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.15-1.module_el8.4.0+641+6116a774" test_ref="oval:org.almalinux.alsa:tst:202105310432"/>
              <criterion comment="python3-criu is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202016500322"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-70.rc92.module_el8.4.0+2332+f4da7515" test_ref="oval:org.almalinux.alsa:tst:202105310451"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-70.rc92.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310452"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-70.rc92.module_el8.4.0+673+eabfc99d" test_ref="oval:org.almalinux.alsa:tst:202105310453"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:1.2.0-9.module_el8.3.0+2067+68fb1526.alma.1" test_ref="oval:org.almalinux.alsa:tst:202105310471"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:1.2.0-9.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310472"/>
              <criterion comment="skopeo is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750222"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:1.2.0-9.module_el8.3.0+2067+68fb1526.alma.1" test_ref="oval:org.almalinux.alsa:tst:202105310491"/>
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:1.2.0-9.module_el8.3.0+699+d61d9c41" test_ref="oval:org.almalinux.alsa:tst:202105310492"/>
              <criterion comment="skopeo-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030362"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:1.1.8-1.module_el8.5.0+2613+1b78b731" test_ref="oval:org.almalinux.alsa:tst:202105310511"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:1.1.8-1.module_el8.5.0+256+72731da5" test_ref="oval:org.almalinux.alsa:tst:202105310512"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.8-1.module_el8.4.0+2518+22932769" test_ref="oval:org.almalinux.alsa:tst:202105310531"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.8-1.module_el8.4.0+781+acf4c33b" test_ref="oval:org.almalinux.alsa:tst:202105310532"/>
              <criterion comment="toolbox is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030402"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.4-1.module_el8.4.0+2481+9da8acfb" test_ref="oval:org.almalinux.alsa:tst:202105310551"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.4-1.module_el8.4.0+2491+9da8acfb" test_ref="oval:org.almalinux.alsa:tst:202105310552"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.4-1.module_el8.4.0+641+6116a774" test_ref="oval:org.almalinux.alsa:tst:202105310553"/>
              <criterion comment="udica is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202003480402"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210537" version="638">
      <metadata>
        <title>ALSA-2021:0537: kernel-rt security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0537" ref_url="https://errata.almalinux.org/8/ALSA-2021-0537.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0537" ref_url="https://access.redhat.com/errata/RHSA-2021:0537" source="RHSA"/>
        <reference ref_id="CVE-2020-14351" ref_url="https://access.redhat.com/security/cve/CVE-2020-14351" source="CVE"/>
        <reference ref_id="CVE-2020-25705" ref_url="https://access.redhat.com/security/cve/CVE-2020-25705" source="CVE"/>
        <reference ref_id="CVE-2020-29661" ref_url="https://access.redhat.com/security/cve/CVE-2020-29661" source="CVE"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)

* kernel: performance counters race condition use-after-free (CVE-2020-14351)

* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the RHEL-8.3.z2 source tree (BZ#1908433)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-14351" impact="moderate" public="20201106:1400">CVE-2020-14351</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-330" href="https://access.redhat.com/security/cve/CVE-2020-25705" impact="moderate" public="20201113">CVE-2020-25705</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-667-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-29661" impact="important" public="20201204">CVE-2020-29661</cve>
          <bugzilla href="https://bugzilla.redhat.com/1862849" id="1862849">CVE-2020-14351 kernel: performance counters race condition use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894579" id="1894579">CVE-2020-25705 kernel: ICMP rate limiting can be used for DNS poisoning attack</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1906525" id="1906525">CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.15.1.rt7.69.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20210537025"/>
            <criterion comment="kernel-rt earlier than 0:4.18.0-240.15.1.rt7.69.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20210537026"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="kernel-rt is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537001"/>
              <criterion comment="kernel-rt is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-core is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537003"/>
              <criterion comment="kernel-rt-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537005"/>
              <criterion comment="kernel-rt-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-core is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537007"/>
              <criterion comment="kernel-rt-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-devel is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537009"/>
              <criterion comment="kernel-rt-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-kvm is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537011"/>
              <criterion comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537013"/>
              <criterion comment="kernel-rt-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-debug-modules-extra is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537015"/>
              <criterion comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-devel is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537017"/>
              <criterion comment="kernel-rt-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-kvm is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537019"/>
              <criterion comment="kernel-rt-kvm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537021"/>
              <criterion comment="kernel-rt-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-rt-modules-extra is earlier than 0:4.18.0-240.15.1.rt7.69.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210537023"/>
              <criterion comment="kernel-rt-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191174024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210538" version="638">
      <metadata>
        <title>ALSA-2021:0538: nss security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0538" ref_url="https://errata.almalinux.org/8/ALSA-2021-0538.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0538" ref_url="https://access.redhat.com/errata/RHSA-2021:0538" source="RHSA"/>
        <reference ref_id="CVE-2020-12400" ref_url="https://access.redhat.com/security/cve/CVE-2020-12400" source="CVE"/>
        <reference ref_id="CVE-2020-12403" ref_url="https://access.redhat.com/security/cve/CVE-2020-12403" source="CVE"/>
        <reference ref_id="CVE-2020-6829" ref_url="https://access.redhat.com/security/cve/CVE-2020-6829" source="CVE"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

* nss: Side channel attack on ECDSA signature generation (CVE-2020-6829)

* nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400)

* nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Support key wrap/unwrap with RSA-OAEP (BZ#1896431)

* 1536bit group from RFC3526 is allowed in FIPS mode when in policy DH-MIN is set to be lower than 1536 (BZ#1896432)

* when NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess [rhel-8] (BZ#1896933)

* Policy should allow overriding library defaults (BZ#1898702)

* KDF-self-tests-induced changes for nss in RHEL 8.4 (BZ#1898953)

* nss: non-blocksize requests to IKEv1 KDF returns bogus output (BZ#1904408)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-12400" impact="moderate" public="20200728">CVE-2020-12400</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://access.redhat.com/security/cve/CVE-2020-12403" impact="moderate" public="20200727">CVE-2020-12403</cve>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://access.redhat.com/security/cve/CVE-2020-6829" impact="moderate" public="20200602:1200">CVE-2020-6829</cve>
          <bugzilla href="https://bugzilla.redhat.com/1826187" id="1826187">CVE-2020-6829 nss: Side channel attack on ECDSA signature generation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1853983" id="1853983">CVE-2020-12400 nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1868931" id="1868931">CVE-2020-12403 nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nss is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538001"/>
              <criterion comment="nss is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-devel is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538003"/>
              <criterion comment="nss-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538005"/>
              <criterion comment="nss-softokn is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-devel is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538007"/>
              <criterion comment="nss-softokn-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538009"/>
              <criterion comment="nss-softokn-freebl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-softokn-freebl-devel is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538011"/>
              <criterion comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-sysinit is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538013"/>
              <criterion comment="nss-sysinit is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-tools is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538015"/>
              <criterion comment="nss-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538017"/>
              <criterion comment="nss-util is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nss-util-devel is earlier than 0:3.53.1-17.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210538019"/>
              <criterion comment="nss-util-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191951024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210548" version="638">
      <metadata>
        <title>ALSA-2021:0548: nodejs:10 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0548" ref_url="https://errata.almalinux.org/8/ALSA-2021-0548.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0548" ref_url="https://access.redhat.com/errata/RHSA-2021:0548" source="RHSA"/>
        <reference ref_id="CVE-2020-15095" ref_url="https://access.redhat.com/security/cve/CVE-2020-15095" source="CVE"/>
        <reference ref_id="CVE-2020-15366" ref_url="https://access.redhat.com/security/cve/CVE-2020-15366" source="CVE"/>
        <reference ref_id="CVE-2020-7608" ref_url="https://access.redhat.com/security/cve/CVE-2020-7608" source="CVE"/>
        <reference ref_id="CVE-2020-7754" ref_url="https://access.redhat.com/security/cve/CVE-2020-7754" source="CVE"/>
        <reference ref_id="CVE-2020-7774" ref_url="https://access.redhat.com/security/cve/CVE-2020-7774" source="CVE"/>
        <reference ref_id="CVE-2020-7788" ref_url="https://access.redhat.com/security/cve/CVE-2020-7788" source="CVE"/>
        <reference ref_id="CVE-2020-8116" ref_url="https://access.redhat.com/security/cve/CVE-2020-8116" source="CVE"/>
        <reference ref_id="CVE-2020-8252" ref_url="https://access.redhat.com/security/cve/CVE-2020-8252" source="CVE"/>
        <reference ref_id="CVE-2020-8265" ref_url="https://access.redhat.com/security/cve/CVE-2020-8265" source="CVE"/>
        <reference ref_id="CVE-2020-8287" ref_url="https://access.redhat.com/security/cve/CVE-2020-8287" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (10.23.1).

Security Fix(es):

* libuv: buffer overflow in realpath (CVE-2020-8252)

* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)

* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)

* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)

* nodejs-dot-prop: prototype pollution (CVE-2020-8116)

* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)

* npm: sensitive information exposure through logs (CVE-2020-15095)

* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)

* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)

* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-532" href="https://access.redhat.com/security/cve/CVE-2020-15095" impact="moderate" public="20200707">CVE-2020-15095</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-15366" impact="moderate" public="20200704">CVE-2020-15366</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-267" href="https://access.redhat.com/security/cve/CVE-2020-7608" impact="low" public="20200316">CVE-2020-7608</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7754" impact="low" public="20201016">CVE-2020-7754</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-915" href="https://access.redhat.com/security/cve/CVE-2020-7774" impact="low" public="20201025">CVE-2020-7774</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7788" impact="moderate" public="20201208">CVE-2020-7788</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-8116" impact="moderate" public="20200128">CVE-2020-8116</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-131-&gt;CWE-122" href="https://access.redhat.com/security/cve/CVE-2020-8252" impact="low" public="20200915">CVE-2020-8252</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8265" impact="moderate" public="20210104">CVE-2020-8265</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-8287" impact="low" public="20210104">CVE-2020-8287</cve>
          <bugzilla href="https://bugzilla.redhat.com/1840004" id="1840004">CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1856875" id="1856875">CVE-2020-15095 npm: sensitive information exposure through logs</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1857977" id="1857977">CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1868196" id="1868196">CVE-2020-8116 nodejs-dot-prop: prototype pollution</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879315" id="1879315">CVE-2020-8252 libuv: buffer overflow in realpath</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1892430" id="1892430">CVE-2020-7754 nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898680" id="1898680">CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1907444" id="1907444">CVE-2020-7788 nodejs-ini: Prototype pollution via malicious INI file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912854" id="1912854">CVE-2020-8265 nodejs: use-after-free in the TLS implementation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912863" id="1912863">CVE-2020-8287 nodejs: HTTP request smuggling via two copies of a header field in an http request</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:10.23.1-1.module+el8.3.0+9502+012d8a97" test_ref="oval:org.almalinux.alsa:tst:20210548001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:10.23.1-1.module+el8.3.0+9502+012d8a97" test_ref="oval:org.almalinux.alsa:tst:20210548003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:10.23.1-1.module+el8.3.0+9502+012d8a97" test_ref="oval:org.almalinux.alsa:tst:20210548005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
              <criterion comment="nodejs-full-i18n is earlier than 1:10.23.1-1.module+el8.3.0+9502+012d8a97" test_ref="oval:org.almalinux.alsa:tst:20210548007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97" test_ref="oval:org.almalinux.alsa:tst:20210548013"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210549" version="636">
      <metadata>
        <title>ALSA-2021:0549: nodejs:12 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0549" ref_url="https://errata.almalinux.org/8/ALSA-2021-0549.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0549" ref_url="https://access.redhat.com/errata/RHSA-2021:0549" source="RHSA"/>
        <reference ref_id="CVE-2018-3750" ref_url="https://access.redhat.com/security/cve/CVE-2018-3750" source="CVE"/>
        <reference ref_id="CVE-2019-10746" ref_url="https://access.redhat.com/security/cve/CVE-2019-10746" source="CVE"/>
        <reference ref_id="CVE-2019-10747" ref_url="https://access.redhat.com/security/cve/CVE-2019-10747" source="CVE"/>
        <reference ref_id="CVE-2020-7754" ref_url="https://access.redhat.com/security/cve/CVE-2020-7754" source="CVE"/>
        <reference ref_id="CVE-2020-7788" ref_url="https://access.redhat.com/security/cve/CVE-2020-7788" source="CVE"/>
        <reference ref_id="CVE-2020-8265" ref_url="https://access.redhat.com/security/cve/CVE-2020-8265" source="CVE"/>
        <reference ref_id="CVE-2020-8287" ref_url="https://access.redhat.com/security/cve/CVE-2020-8287" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).

Security Fix(es):

* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)

* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)

* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)

* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)

* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)

* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2018-3750" impact="low" public="20180418">CVE-2018-3750</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2019-10746" impact="low" public="20190619">CVE-2019-10746</cve>
          <cve cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2019-10747" impact="low" public="20190620">CVE-2019-10747</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7754" impact="low" public="20201016">CVE-2020-7754</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7788" impact="moderate" public="20201208">CVE-2020-7788</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8265" impact="moderate" public="20210104">CVE-2020-8265</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-8287" impact="low" public="20210104">CVE-2020-8287</cve>
          <bugzilla href="https://bugzilla.redhat.com/1578246" id="1578246">CVE-2018-3750 nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1795475" id="1795475">CVE-2019-10746 nodejs-mixin-deep: prototype pollution in function mixin-deep</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1795479" id="1795479">CVE-2019-10747 nodejs-set-value: prototype pollution in function set-value</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1892430" id="1892430">CVE-2020-7754 nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1907444" id="1907444">CVE-2020-7788 nodejs-ini: Prototype pollution via malicious INI file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912854" id="1912854">CVE-2020-8265 nodejs: use-after-free in the TLS implementation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912863" id="1912863">CVE-2020-8287 nodejs: HTTP request smuggling via two copies of a header field in an http request</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:12.20.1-1.module+el8.3.0+9503+19cb079c" test_ref="oval:org.almalinux.alsa:tst:20210549001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:12.20.1-1.module+el8.3.0+9503+19cb079c" test_ref="oval:org.almalinux.alsa:tst:20210549003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:12.20.1-1.module+el8.3.0+9503+19cb079c" test_ref="oval:org.almalinux.alsa:tst:20210549005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
              <criterion comment="nodejs-full-i18n is earlier than 1:12.20.1-1.module+el8.3.0+9503+19cb079c" test_ref="oval:org.almalinux.alsa:tst:20210549007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alsa:tst:202105490091"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alsa:tst:202105490092"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c" test_ref="oval:org.almalinux.alsa:tst:20210549013"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210551" version="635">
      <metadata>
        <title>ALSA-2021:0551: nodejs:14 security and bug fix update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0551" ref_url="https://errata.almalinux.org/8/ALSA-2021-0551.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0551" ref_url="https://access.redhat.com/errata/RHSA-2021:0551" source="RHSA"/>
        <reference ref_id="CVE-2020-15366" ref_url="https://access.redhat.com/security/cve/CVE-2020-15366" source="CVE"/>
        <reference ref_id="CVE-2020-7754" ref_url="https://access.redhat.com/security/cve/CVE-2020-7754" source="CVE"/>
        <reference ref_id="CVE-2020-7774" ref_url="https://access.redhat.com/security/cve/CVE-2020-7774" source="CVE"/>
        <reference ref_id="CVE-2020-7788" ref_url="https://access.redhat.com/security/cve/CVE-2020-7788" source="CVE"/>
        <reference ref_id="CVE-2020-8265" ref_url="https://access.redhat.com/security/cve/CVE-2020-8265" source="CVE"/>
        <reference ref_id="CVE-2020-8277" ref_url="https://access.redhat.com/security/cve/CVE-2020-8277" source="CVE"/>
        <reference ref_id="CVE-2020-8287" ref_url="https://access.redhat.com/security/cve/CVE-2020-8287" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (14.15.4).

Security Fix(es):

* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)

* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)

* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)

* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)

* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)

* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)

* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-471" href="https://access.redhat.com/security/cve/CVE-2020-15366" impact="moderate" public="20200704">CVE-2020-15366</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7754" impact="low" public="20201016">CVE-2020-7754</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-915" href="https://access.redhat.com/security/cve/CVE-2020-7774" impact="low" public="20201025">CVE-2020-7774</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2020-7788" impact="moderate" public="20201208">CVE-2020-7788</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-8265" impact="moderate" public="20210104">CVE-2020-8265</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8277" impact="moderate" public="20201112">CVE-2020-8277</cve>
          <cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cwe="CWE-444" href="https://access.redhat.com/security/cve/CVE-2020-8287" impact="low" public="20210104">CVE-2020-8287</cve>
          <bugzilla href="https://bugzilla.redhat.com/1857977" id="1857977">CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1892430" id="1892430">CVE-2020-7754 nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898554" id="1898554">CVE-2020-8277 c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1898680" id="1898680">CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1907444" id="1907444">CVE-2020-7788 nodejs-ini: Prototype pollution via malicious INI file</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912854" id="1912854">CVE-2020-8265 nodejs: use-after-free in the TLS implementation</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1912863" id="1912863">CVE-2020-8287 nodejs: HTTP request smuggling via two copies of a header field in an http request</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:14 is enabled" test_ref="oval:org.almalinux.alsa:tst:20210551015"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
              <criterion comment="nodejs is earlier than 1:14.15.4-2.module+el8.3.0+9635+ffdf8381" test_ref="oval:org.almalinux.alsa:tst:20210551001"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
              <criterion comment="nodejs-devel is earlier than 1:14.15.4-2.module+el8.3.0+9635+ffdf8381" test_ref="oval:org.almalinux.alsa:tst:20210551003"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="nodejs-docs is earlier than 1:14.15.4-2.module+el8.3.0+9635+ffdf8381" test_ref="oval:org.almalinux.alsa:tst:20210551005"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
              <criterion comment="nodejs-full-i18n is earlier than 1:14.15.4-2.module+el8.3.0+9635+ffdf8381" test_ref="oval:org.almalinux.alsa:tst:20210551007"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+2522+3bd42762" test_ref="oval:org.almalinux.alsa:tst:202105510091"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+663+8c237b4b" test_ref="oval:org.almalinux.alsa:tst:202105510092"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:23-3.module_el8.5.0+2618+8d46dafd" test_ref="oval:org.almalinux.alsa:tst:202105510111"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:23-3.module_el8.5.0+254+b4526b16" test_ref="oval:org.almalinux.alsa:tst:202105510112"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
              <criterion comment="npm is earlier than 1:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381" test_ref="oval:org.almalinux.alsa:tst:20210551013"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210557" version="636">
      <metadata>
        <title>ALSA-2021:0557: perl security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0557" ref_url="https://errata.almalinux.org/8/ALSA-2021-0557.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0557" ref_url="https://access.redhat.com/errata/RHSA-2021:0557" source="RHSA"/>
        <reference ref_id="CVE-2020-12723" ref_url="https://access.redhat.com/security/cve/CVE-2020-12723" source="CVE"/>
        <description>Perl is a high-level programming language that is commonly used for system administration utilities and web programming.

Security Fix(es):

* perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20-&gt;CWE-185" href="https://access.redhat.com/security/cve/CVE-2020-12723" impact="moderate" public="20200602">CVE-2020-12723</cve>
          <bugzilla href="https://bugzilla.redhat.com/1838000" id="1838000">CVE-2020-12723 perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="perl is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557001"/>
              <criterion comment="perl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Attribute-Handlers is earlier than 0:0.99-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557003"/>
              <criterion comment="perl-Attribute-Handlers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Devel-Peek is earlier than 0:1.26-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557005"/>
              <criterion comment="perl-Devel-Peek is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Devel-SelfStubber is earlier than 0:1.06-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557007"/>
              <criterion comment="perl-Devel-SelfStubber is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Errno is earlier than 0:1.28-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557009"/>
              <criterion comment="perl-Errno is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.34-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557011"/>
              <criterion comment="perl-ExtUtils-Embed is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-ExtUtils-Miniperl is earlier than 0:1.06-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557013"/>
              <criterion comment="perl-ExtUtils-Miniperl is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-IO is earlier than 0:1.38-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557015"/>
              <criterion comment="perl-IO is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-IO-Zlib is earlier than 1:1.10-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557017"/>
              <criterion comment="perl-IO-Zlib is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.21-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557019"/>
              <criterion comment="perl-Locale-Maketext-Simple is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Math-Complex is earlier than 0:1.59-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557021"/>
              <criterion comment="perl-Math-Complex is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Memoize is earlier than 0:1.03-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557023"/>
              <criterion comment="perl-Memoize is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Module-Loaded is earlier than 1:0.08-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557025"/>
              <criterion comment="perl-Module-Loaded is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Net-Ping is earlier than 0:2.55-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557027"/>
              <criterion comment="perl-Net-Ping is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Pod-Html is earlier than 0:1.22.02-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557029"/>
              <criterion comment="perl-Pod-Html is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-SelfLoader is earlier than 0:1.23-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557031"/>
              <criterion comment="perl-SelfLoader is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Test is earlier than 0:1.30-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557033"/>
              <criterion comment="perl-Test is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-Time-Piece is earlier than 0:1.31-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557035"/>
              <criterion comment="perl-Time-Piece is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-devel is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557037"/>
              <criterion comment="perl-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-interpreter is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557039"/>
              <criterion comment="perl-interpreter is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-libnetcfg is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557041"/>
              <criterion comment="perl-libnetcfg is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-libs is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557043"/>
              <criterion comment="perl-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-macros is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557045"/>
              <criterion comment="perl-macros is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-open is earlier than 0:1.11-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557047"/>
              <criterion comment="perl-open is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-tests is earlier than 4:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557049"/>
              <criterion comment="perl-tests is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557050"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perl-utils is earlier than 0:5.26.3-417.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210557051"/>
              <criterion comment="perl-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210557052"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210558" version="642">
      <metadata>
        <title>ALSA-2021:0558: kernel security, bug fix, and enhancement update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0558" ref_url="https://errata.almalinux.org/8/ALSA-2021-0558.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0558" ref_url="https://access.redhat.com/errata/RHSA-2021:0558" source="RHSA"/>
        <reference ref_id="CVE-2020-14351" ref_url="https://access.redhat.com/security/cve/CVE-2020-14351" source="CVE"/>
        <reference ref_id="CVE-2020-25705" ref_url="https://access.redhat.com/security/cve/CVE-2020-25705" source="CVE"/>
        <reference ref_id="CVE-2020-29661" ref_url="https://access.redhat.com/security/cve/CVE-2020-29661" source="CVE"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)

* kernel: performance counters race condition use-after-free (CVE-2020-14351)

* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Final fixes + drop alpha_support flag requirement for Tigerlake (BZ#1882620)

* OVS complains Invalid Argument on TCP packets going into conntrack (BZ#1892744)

* BUG: using smp_processor_id() in preemptible [00000000] code: handler106/3082 (BZ#1893281)

* Icelake performance - add  intel_idle: Customize IceLake server support  to RHEL-8 (BZ#1897183)

* [mlx5] IPV6 TOS rewrite flows are not getting offloaded in HW (BZ#1897688)

* RHEL 8.3 SAS - multipathd fails to re-establish paths during controller random reset (BZ#1900112)

* RHEL8.3 Beta - RHEL8.3 hangs on dbginfo.sh execution, crash dump generated (mm-) (BZ#1903019)

* Win10 guest automatic reboot after migration in Win10 and WSL2 on AMD hosts (BZ#1905084)

* block, dm: fix IO splitting for stacked devices (BZ#1905136)

* Failed to hotplug scsi-hd disks (BZ#1905214)

* PCI quirk needed to prevent GPU hang (BZ#1906516)

* RHEL8.2 - various patches to stabilize the OPAL error log processing and the powernv dump processing (ESS) (BZ#1907301)

* pmtu not working with tunnels as bridge ports and br_netfilter loaded (BZ#1907576)

* [ThinkPad X13/T14/T14s AMD]: Kdump failed (BZ#1907775)

* NFSv4 client improperly handles interrupted slots (BZ#1908312)

* NFSv4.1 client ignores ERR_DELAY during LOCK recovery, could lead to data corruption (BZ#1908313)

* [Regression] RHEL8.2 - [kernel 148.el8] cpu (sys) time regression in SAP HANA 2.0 benchmark benchInsertSubSelectPerformance (BZ#1908519)

* RHEL8: kernel-rt: kernel BUG at kernel/sched/deadline.c:1462! (BZ#1908731)

* SEV VM hang at efi_mokvar_sysfs_init+0xa9/0x19d during boot (BZ#1909243)

* C6gn support requires "Ensure dirty bit is preserved across pte_wrprotect" patch (BZ#1909577)

* [Lenovo 8.3 &amp; 8.4 Bug] [Regression] No response from keyboard and mouse when boot from tboot kernel (BZ#1911555)

* Kernel crash with krb5p (BZ#1912478)

* [RHEL8] Need additional backports for FIPS 800-90A DRBG entropy seeding source (BZ#1912872)

* [Hyper-V][RHEL-8] Request to included a commit that adds a timeout to vmbus_wait_for_unload (BZ#1913528)

* Host becomes unresponsive during stress-ng --cyclic test rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (BZ#1913964)

* RHEL8.4: Backport upstream RCU patches up to v5.6 (BZ#1915638)

* Missing mm backport to fix regression introduced by another mm backport (BZ#1915814)

* [Hyper-V][RHEL-8]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1917711)

* ionic 0000:39:00.0 ens2: IONIC_CMD_Q_INIT (40) failed: IONIC_RC_ERROR (-5) (BZ#1918372)

* [certification] mlx5_core depends on tls triggering TAINT_TECH_PREVIEW even if no ConnectX-6 card is present (BZ#1918743)

* kvm-rhel8.3 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1919885)

Enhancement(s):

* [Mellanox 8.4 FEAT] mlx5: Add messages when VF-LAG fails to start (BZ#1892344)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-16"/>
          <updated date="2021-02-16"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-14351" impact="moderate" public="20201106:1400">CVE-2020-14351</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-330" href="https://access.redhat.com/security/cve/CVE-2020-25705" impact="moderate" public="20201113">CVE-2020-25705</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-667-&gt;CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-29661" impact="important" public="20201204">CVE-2020-29661</cve>
          <bugzilla href="https://bugzilla.redhat.com/1862849" id="1862849">CVE-2020-14351 kernel: performance counters race condition use-after-free</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1894579" id="1894579">CVE-2020-25705 kernel: ICMP rate limiting can be used for DNS poisoning attack</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1906525" id="1906525">CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criterion comment="kernel earlier than 0:4.18.0-240.15.1.el8_3 is currently running" test_ref="oval:org.almalinux.alsa:tst:20210537025"/>
            <criterion comment="kernel earlier than 0:4.18.0-240.15.1.el8_3 is set to boot up on next boot" test_ref="oval:org.almalinux.alsa:tst:20210558050"/>
          </criteria>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bpftool is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558001"/>
              <criterion comment="bpftool is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558003"/>
              <criterion comment="kernel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-abi-whitelists is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558005"/>
              <criterion comment="kernel-abi-whitelists is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-core is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558007"/>
              <criterion comment="kernel-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-cross-headers is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558009"/>
              <criterion comment="kernel-cross-headers is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558011"/>
              <criterion comment="kernel-debug is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-core is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558013"/>
              <criterion comment="kernel-debug-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-devel is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558015"/>
              <criterion comment="kernel-debug-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558017"/>
              <criterion comment="kernel-debug-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-debug-modules-extra is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558019"/>
              <criterion comment="kernel-debug-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-devel is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558021"/>
              <criterion comment="kernel-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-doc is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558023"/>
              <criterion comment="kernel-doc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558025"/>
              <criterion comment="kernel-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-modules-extra is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558027"/>
              <criterion comment="kernel-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558029"/>
              <criterion comment="kernel-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558031"/>
              <criterion comment="kernel-tools-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-tools-libs-devel is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558033"/>
              <criterion comment="kernel-tools-libs-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558035"/>
              <criterion comment="kernel-zfcpdump is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167038"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-core is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558037"/>
              <criterion comment="kernel-zfcpdump-core is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167040"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-devel is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558039"/>
              <criterion comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558041"/>
              <criterion comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167044"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558043"/>
              <criterion comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167046"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="perf is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558045"/>
              <criterion comment="perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167048"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-perf is earlier than 0:4.18.0-240.15.1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210558047"/>
              <criterion comment="python3-perf is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191167050"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210611" version="635">
      <metadata>
        <title>ALSA-2021:0611: xterm security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0611" ref_url="https://errata.almalinux.org/8/ALSA-2021-0611.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0611" ref_url="https://access.redhat.com/errata/RHSA-2021:0611" source="RHSA"/>
        <reference ref_id="CVE-2021-27135" ref_url="https://access.redhat.com/security/cve/CVE-2021-27135" source="CVE"/>
        <description>The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.

Security Fix(es):

* xterm: crash when processing combining characters (CVE-2021-27135)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-18"/>
          <updated date="2021-02-18"/>
          <cve cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2021-27135" impact="important" public="20210210">CVE-2021-27135</cve>
          <bugzilla href="https://bugzilla.redhat.com/1927559" id="1927559">CVE-2021-27135 xterm: crash when processing combining characters</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="xterm is earlier than 0:331-1.el8_3.2" test_ref="oval:org.almalinux.alsa:tst:20210611001"/>
              <criterion comment="xterm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210611002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="xterm-resize is earlier than 0:331-1.el8_3.2" test_ref="oval:org.almalinux.alsa:tst:20210611003"/>
              <criterion comment="xterm-resize is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210611004"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210618" version="635">
      <metadata>
        <title>ALSA-2021:0618: stunnel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0618" ref_url="https://errata.almalinux.org/8/ALSA-2021-0618.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0618" ref_url="https://access.redhat.com/errata/RHSA-2021:0618" source="RHSA"/>
        <reference ref_id="CVE-2021-20230" ref_url="https://access.redhat.com/security/cve/CVE-2021-20230" source="CVE"/>
        <description>Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption.

Security Fix(es):

* stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-22"/>
          <updated date="2021-02-22"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2021-20230" impact="important" public="20201011">CVE-2021-20230</cve>
          <bugzilla href="https://bugzilla.redhat.com/1925226" id="1925226">CVE-2021-20230 stunnel: client certificate not correctly verified when redirect and verifyChain options are used</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="stunnel is earlier than 0:5.56-5.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210618001"/>
          <criterion comment="stunnel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210618002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210655" version="636">
      <metadata>
        <title>ALSA-2021:0655: firefox security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0655" ref_url="https://errata.almalinux.org/8/ALSA-2021-0655.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0655" ref_url="https://access.redhat.com/errata/RHSA-2021:0655" source="RHSA"/>
        <reference ref_id="CVE-2021-23968" ref_url="https://access.redhat.com/security/cve/CVE-2021-23968" source="CVE"/>
        <reference ref_id="CVE-2021-23969" ref_url="https://access.redhat.com/security/cve/CVE-2021-23969" source="CVE"/>
        <reference ref_id="CVE-2021-23973" ref_url="https://access.redhat.com/security/cve/CVE-2021-23973" source="CVE"/>
        <reference ref_id="CVE-2021-23978" ref_url="https://access.redhat.com/security/cve/CVE-2021-23978" source="CVE"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 78.8.0 ESR.

Security Fix(es):

* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968)

* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969)

* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978)

* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-24"/>
          <updated date="2021-02-24"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2021-23968" impact="important" public="20210223">CVE-2021-23968</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2021-23969" impact="important" public="20210223">CVE-2021-23969</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://access.redhat.com/security/cve/CVE-2021-23973" impact="low" public="20210223">CVE-2021-23973</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2021-23978" impact="important" public="20210223">CVE-2021-23978</cve>
          <bugzilla href="https://bugzilla.redhat.com/1932109" id="1932109">CVE-2021-23969 Mozilla: Content Security Policy violation report could have contained the destination of a redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932110" id="1932110">CVE-2021-23968 Mozilla: Content Security Policy violation report could have contained the destination of a redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932111" id="1932111">CVE-2021-23973 Mozilla: MediaError message property could have leaked information about cross-origin resources</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932112" id="1932112">CVE-2021-23978 Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="firefox is earlier than 0:78.8.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210655001"/>
          <criterion comment="firefox is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20190966002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210657" version="635">
      <metadata>
        <title>ALSA-2021:0657: thunderbird security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0657" ref_url="https://errata.almalinux.org/8/ALSA-2021-0657.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0657" ref_url="https://access.redhat.com/errata/RHSA-2021:0657" source="RHSA"/>
        <reference ref_id="CVE-2021-23968" ref_url="https://access.redhat.com/security/cve/CVE-2021-23968" source="CVE"/>
        <reference ref_id="CVE-2021-23969" ref_url="https://access.redhat.com/security/cve/CVE-2021-23969" source="CVE"/>
        <reference ref_id="CVE-2021-23973" ref_url="https://access.redhat.com/security/cve/CVE-2021-23973" source="CVE"/>
        <reference ref_id="CVE-2021-23978" ref_url="https://access.redhat.com/security/cve/CVE-2021-23978" source="CVE"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.8.0.

Security Fix(es):

* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968)

* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969)

* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978)

* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-02-24"/>
          <updated date="2021-02-24"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2021-23968" impact="important" public="20210223">CVE-2021-23968</cve>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://access.redhat.com/security/cve/CVE-2021-23969" impact="important" public="20210223">CVE-2021-23969</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://access.redhat.com/security/cve/CVE-2021-23973" impact="low" public="20210223">CVE-2021-23973</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://access.redhat.com/security/cve/CVE-2021-23978" impact="important" public="20210223">CVE-2021-23978</cve>
          <bugzilla href="https://bugzilla.redhat.com/1932109" id="1932109">CVE-2021-23969 Mozilla: Content Security Policy violation report could have contained the destination of a redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932110" id="1932110">CVE-2021-23968 Mozilla: Content Security Policy violation report could have contained the destination of a redirect</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932111" id="1932111">CVE-2021-23973 Mozilla: MediaError message property could have leaked information about cross-origin resources</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932112" id="1932112">CVE-2021-23978 Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="thunderbird is earlier than 0:78.8.0-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210657001"/>
          <criterion comment="thunderbird is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191144002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210670" version="637">
      <metadata>
        <title>ALSA-2021:0670: bind security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0670" ref_url="https://errata.almalinux.org/8/ALSA-2021-0670.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0670" ref_url="https://access.redhat.com/errata/RHSA-2021:0670" source="RHSA"/>
        <reference ref_id="CVE-2020-8625" ref_url="https://access.redhat.com/security/cve/CVE-2020-8625" source="CVE"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-01"/>
          <updated date="2021-03-01"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-8625" impact="important" public="20210217">CVE-2020-8625</cve>
          <bugzilla href="https://bugzilla.redhat.com/1928486" id="1928486">CVE-2020-8625 bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="bind is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670001"/>
              <criterion comment="bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-chroot is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670003"/>
              <criterion comment="bind-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-devel is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670005"/>
              <criterion comment="bind-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-devel is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670007"/>
              <criterion comment="bind-export-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-export-libs is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670009"/>
              <criterion comment="bind-export-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670011"/>
              <criterion comment="bind-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-libs-lite is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670013"/>
              <criterion comment="bind-libs-lite is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-license is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670015"/>
              <criterion comment="bind-license is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-lite-devel is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670017"/>
              <criterion comment="bind-lite-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11 is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670019"/>
              <criterion comment="bind-pkcs11 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-devel is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670021"/>
              <criterion comment="bind-pkcs11-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-libs is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670023"/>
              <criterion comment="bind-pkcs11-libs is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-pkcs11-utils is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670025"/>
              <criterion comment="bind-pkcs11-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670027"/>
              <criterion comment="bind-sdb is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-sdb-chroot is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670029"/>
              <criterion comment="bind-sdb-chroot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="bind-utils is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670031"/>
              <criterion comment="bind-utils is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-bind is earlier than 32:9.11.20-5.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210670033"/>
              <criterion comment="python3-bind is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191145034"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210696" version="638">
      <metadata>
        <title>ALSA-2021:0696: grub2 security update (Moderate)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0696" ref_url="https://errata.almalinux.org/8/ALSA-2021-0696.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0696" ref_url="https://access.redhat.com/errata/RHSA-2021:0696" source="RHSA"/>
        <reference ref_id="CVE-2020-14372" ref_url="https://access.redhat.com/security/cve/CVE-2020-14372" source="CVE"/>
        <reference ref_id="CVE-2020-25632" ref_url="https://access.redhat.com/security/cve/CVE-2020-25632" source="CVE"/>
        <reference ref_id="CVE-2020-25647" ref_url="https://access.redhat.com/security/cve/CVE-2020-25647" source="CVE"/>
        <reference ref_id="CVE-2020-27749" ref_url="https://access.redhat.com/security/cve/CVE-2020-27749" source="CVE"/>
        <reference ref_id="CVE-2020-27779" ref_url="https://access.redhat.com/security/cve/CVE-2020-27779" source="CVE"/>
        <reference ref_id="CVE-2021-20225" ref_url="https://access.redhat.com/security/cve/CVE-2021-20225" source="CVE"/>
        <reference ref_id="CVE-2021-20233" ref_url="https://access.redhat.com/security/cve/CVE-2021-20233" source="CVE"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372)

* grub2: Use-after-free in rmmod command (CVE-2020-25632)

* grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647)

* grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749)

* grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779)

* grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225)

* grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-02"/>
          <updated date="2021-03-02"/>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-184" href="https://access.redhat.com/security/cve/CVE-2020-14372" impact="moderate" public="20210302:1800">CVE-2020-14372</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2020-25632" impact="moderate" public="20210302:1800">CVE-2020-25632</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2020-25647" impact="moderate" public="20210302:1800">CVE-2020-25647</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-121" href="https://access.redhat.com/security/cve/CVE-2020-27749" impact="moderate" public="20210302:1800">CVE-2020-27749</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-285" href="https://access.redhat.com/security/cve/CVE-2020-27779" impact="moderate" public="20210302:1800">CVE-2020-27779</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2021-20225" impact="moderate" public="20210302:1800">CVE-2021-20225</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-787" href="https://access.redhat.com/security/cve/CVE-2021-20233" impact="moderate" public="20210302:1800">CVE-2021-20233</cve>
          <bugzilla href="https://bugzilla.redhat.com/1873150" id="1873150">CVE-2020-14372 grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1879577" id="1879577">CVE-2020-25632 grub2: Use-after-free in rmmod command</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1886936" id="1886936">CVE-2020-25647 grub2: Out-of-bounds write in grub_usb_device_initialize()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1899966" id="1899966">CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline()</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1900698" id="1900698">CVE-2020-27779 grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1924696" id="1924696">CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1926263" id="1926263">CVE-2021-20233 grub2: Heap out-of-bounds write due to miscalculation of space required for quoting</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="grub2-common is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696001"/>
              <criterion comment="grub2-common is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64 is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696003"/>
              <criterion comment="grub2-efi-aa64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-cdboot is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696005"/>
              <criterion comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-aa64-modules is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696007"/>
              <criterion comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32 is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696009"/>
              <criterion comment="grub2-efi-ia32 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-cdboot is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696011"/>
              <criterion comment="grub2-efi-ia32-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-ia32-modules is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696013"/>
              <criterion comment="grub2-efi-ia32-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64 is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696015"/>
              <criterion comment="grub2-efi-x64 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-cdboot is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696017"/>
              <criterion comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-efi-x64-modules is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696019"/>
              <criterion comment="grub2-efi-x64-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696021"/>
              <criterion comment="grub2-pc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-pc-modules is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696023"/>
              <criterion comment="grub2-pc-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696025"/>
              <criterion comment="grub2-ppc64le is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-ppc64le-modules is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696027"/>
              <criterion comment="grub2-ppc64le-modules is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696029"/>
              <criterion comment="grub2-tools is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335030"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-efi is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696031"/>
              <criterion comment="grub2-tools-efi is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-extra is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696033"/>
              <criterion comment="grub2-tools-extra is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335034"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="grub2-tools-minimal is earlier than 1:2.02-90.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210696035"/>
              <criterion comment="grub2-tools-minimal is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200335036"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210705" version="635">
      <metadata>
        <title>ALSA-2021:0705: container-tools:1.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0705" ref_url="https://errata.almalinux.org/8/ALSA-2021-0705.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0705" ref_url="https://access.redhat.com/errata/RHSA-2021:0705" source="RHSA"/>
        <reference ref_id="CVE-2021-20188" ref_url="https://access.redhat.com/security/cve/CVE-2021-20188" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-02"/>
          <updated date="2021-03-02"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2021-20188" impact="important" public="20210210">CVE-2021-20188</cve>
          <bugzilla href="https://bugzilla.redhat.com/1915734" id="1915734">CVE-2021-20188 podman: container users permissions are not respected in privileged containers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:1.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20193494025"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-8.gite94b4f9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050011"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-8.gite94b4f9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050012"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.5-8.gite94b4f9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050013"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050031"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050032"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.124.0-1.gitf958d0c.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050033"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050051"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050052"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.7.4-4.git9ebe139.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050053"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050071"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050072"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050073"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050091"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050092"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050093"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050111"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050112"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050113"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050131"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050132"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.3-5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050133"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050151"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050152"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-systemd-hook is earlier than 1:0.1.15-2.git2d0b8a3.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050153"/>
              <criterion comment="oci-systemd-hook is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050171"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050172"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="oci-umount is earlier than 2:2.3.4-2.git87f9237.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050173"/>
              <criterion comment="oci-umount is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-8.git921f98f.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050191"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-8.git921f98f.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050192"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.0.0-8.git921f98f.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050193"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-8.git921f98f.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050211"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-8.git921f98f.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050212"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.0.0-8.git921f98f.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050213"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050231"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050232"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050233"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050251"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050252"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-56.rc5.dev.git2abd837.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050253"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2478+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050271"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050272"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.32-6.git1715c90.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050273"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.3.0+2044+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050291"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.4.0+2496+12421f43" test_ref="oval:org.almalinux.alsa:tst:202107050292"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.1-5.dev.gitc4e1bc5.module_el8.5.0+119+9a9ec082" test_ref="oval:org.almalinux.alsa:tst:202107050293"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210706" version="635">
      <metadata>
        <title>ALSA-2021:0706: container-tools:2.0 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0706" ref_url="https://errata.almalinux.org/8/ALSA-2021-0706.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0706" ref_url="https://access.redhat.com/errata/RHSA-2021:0706" source="RHSA"/>
        <reference ref_id="CVE-2021-20188" ref_url="https://access.redhat.com/security/cve/CVE-2021-20188" source="CVE"/>
        <description>The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

* podman: container users permissions are not respected in privileged containers (CVE-2021-20188)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-02"/>
          <updated date="2021-03-02"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2021-20188" impact="important" public="20210210">CVE-2021-20188</cve>
          <bugzilla href="https://bugzilla.redhat.com/1915734" id="1915734">CVE-2021-20188 podman: container users permissions are not respected in privileged containers</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module container-tools:2.0 is enabled" test_ref="oval:org.almalinux.alsa:tst:20201931045"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-8.module_el8.4.0+2341+e90fd8eb" test_ref="oval:org.almalinux.alsa:tst:202107060011"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-8.module_el8.4.0+2489+7edfb656" test_ref="oval:org.almalinux.alsa:tst:202107060012"/>
              <criterion comment="buildah is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah is earlier than 0:1.11.6-8.module_el8.4.0+522+66908d0c" test_ref="oval:org.almalinux.alsa:tst:202107060013"/>
              <criterion comment="buildah is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-8.module_el8.4.0+2341+e90fd8eb" test_ref="oval:org.almalinux.alsa:tst:202107060031"/>
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-8.module_el8.4.0+2489+7edfb656" test_ref="oval:org.almalinux.alsa:tst:202107060032"/>
              <criterion comment="buildah-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="buildah-tests is earlier than 0:1.11.6-8.module_el8.4.0+522+66908d0c" test_ref="oval:org.almalinux.alsa:tst:202107060033"/>
              <criterion comment="buildah-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201934030042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060051"/>
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="cockpit-podman is earlier than 0:11-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060052"/>
              <criterion comment="cockpit-podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.15-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060071"/>
              <criterion comment="conmon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="conmon is earlier than 2:2.0.15-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060072"/>
              <criterion comment="conmon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.130.0-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060091"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="container-selinux is earlier than 2:2.130.0-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060092"/>
              <criterion comment="container-selinux is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975004"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060111"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containernetworking-plugins is earlier than 0:0.8.3-4.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060112"/>
              <criterion comment="containernetworking-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.41-4.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060131"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="containers-common is earlier than 1:0.1.41-4.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060132"/>
              <criterion comment="containers-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060151"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="crit is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060152"/>
              <criterion comment="crit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060171"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="criu is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060172"/>
              <criterion comment="criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.8-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060191"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="fuse-overlayfs is earlier than 0:0.7.8-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060192"/>
              <criterion comment="fuse-overlayfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.6.4-26.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060211"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman is earlier than 0:1.6.4-26.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060212"/>
              <criterion comment="podman is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.6.4-26.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060231"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-docker is earlier than 0:1.6.4-26.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060232"/>
              <criterion comment="podman-docker is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975018"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:1.6.4-26.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060251"/>
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-remote is earlier than 0:1.6.4-26.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060252"/>
              <criterion comment="podman-remote is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403026"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:1.6.4-26.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060271"/>
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="podman-tests is earlier than 0:1.6.4-26.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060272"/>
              <criterion comment="podman-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403028"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060291"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python-podman-api is earlier than 0:1.2.0-0.2.gitd0a45fe.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060292"/>
              <criterion comment="python-podman-api is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403030"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060311"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="python3-criu is earlier than 0:3.12-9.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060312"/>
              <criterion comment="python3-criu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20201650032"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.4.0+2341+e90fd8eb" test_ref="oval:org.almalinux.alsa:tst:202107060331"/>
              <criterion comment="runc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.3.0+479+69e2ae26" test_ref="oval:org.almalinux.alsa:tst:202107060332"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="runc is earlier than 0:1.0.0-64.rc10.module_el8.4.0+522+66908d0c" test_ref="oval:org.almalinux.alsa:tst:202107060333"/>
              <criterion comment="runc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201909750202"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.41-4.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060351"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo is earlier than 1:0.1.41-4.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060352"/>
              <criterion comment="skopeo is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.41-4.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060371"/>
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="skopeo-tests is earlier than 1:0.1.41-4.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060372"/>
              <criterion comment="skopeo-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403036"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060391"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="slirp4netns is earlier than 0:0.4.2-3.git21fdece.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060392"/>
              <criterion comment="slirp4netns is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20190975024"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060411"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="toolbox is earlier than 0:0.0.7-1.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060412"/>
              <criterion comment="toolbox is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193403040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.5.0+2566+ec01067b" test_ref="oval:org.almalinux.alsa:tst:202107060431"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="udica is earlier than 0:0.2.1-2.module_el8.5.0+108+00865455" test_ref="oval:org.almalinux.alsa:tst:202107060432"/>
              <criterion comment="udica is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20200348040"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210711" version="635">
      <metadata>
        <title>ALSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0711" ref_url="https://errata.almalinux.org/8/ALSA-2021-0711.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0711" ref_url="https://access.redhat.com/errata/RHSA-2021:0711" source="RHSA"/>
        <reference ref_id="CVE-2020-35517" ref_url="https://access.redhat.com/security/cve/CVE-2020-35517" source="CVE"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-03"/>
          <updated date="2021-03-03"/>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-269" href="https://access.redhat.com/security/cve/CVE-2020-35517" impact="important" public="20210121">CVE-2020-35517</cve>
          <bugzilla href="https://bugzilla.redhat.com/1915823" id="1915823">CVE-2020-35517 QEMU: virtiofsd: potential privileged host device access from guest</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:8::powertools</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="Module virt-devel:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20193345244"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762101"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762111"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762121"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451971"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451981"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933451991"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762161"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762171"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762181"/>
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762191"/>
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762201"/>
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762211"/>
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762221"/>
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762231"/>
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762241"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762251"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762261"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762271"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762281"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762291"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762301"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762311"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762321"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762331"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762341"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762351"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762361"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762371"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762381"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762391"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762401"/>
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762411"/>
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762421"/>
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762431"/>
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762441"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452251"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452261"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452271"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762481"/>
                  <criterion comment="ocaml-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345229"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762501"/>
                  <criterion comment="ocaml-hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345231"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762521"/>
                  <criterion comment="ocaml-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345233"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762522"/>
                  <criterion comment="ocaml-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452332"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762541"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345235"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762542"/>
                  <criterion comment="ocaml-libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452352"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762561"/>
                  <criterion comment="ocaml-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676257"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ocaml-libnbd-devel is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762581"/>
                  <criterion comment="ocaml-libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676259"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762601"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762611"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762621"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762631"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762641"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107110991"/>
                  <criterion comment="qemu-kvm-tests is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20193345241"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-tests is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107110992"/>
                  <criterion comment="qemu-kvm-tests is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201933452412"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046762671"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:201933452431"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
              </criteria>
            </criteria>
            <criteria operator="AND">
              <criterion comment="Module virt:rhel is enabled" test_ref="oval:org.almalinux.alsa:tst:20191175195"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion comment="SLOF is earlier than 0:20191022-3.git899d9883.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760011"/>
                  <criterion comment="SLOF is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175002"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760031"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046760032"/>
                  <criterion comment="hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175004"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046760033"/>
                  <criterion comment="hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760051"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046760052"/>
                  <criterion comment="hivex-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175006"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="hivex-devel is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046760053"/>
                  <criterion comment="hivex-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760071"/>
                  <criterion comment="libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175008"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760072"/>
                  <criterion comment="libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760091"/>
                  <criterion comment="libguestfs-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175010"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-bash-completion is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760092"/>
                  <criterion comment="libguestfs-bash-completion is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750102"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760111"/>
                  <criterion comment="libguestfs-benchmarking is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175012"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-benchmarking is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760112"/>
                  <criterion comment="libguestfs-benchmarking is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760131"/>
                  <criterion comment="libguestfs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175014"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760132"/>
                  <criterion comment="libguestfs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760151"/>
                  <criterion comment="libguestfs-gfs2 is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175016"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gfs2 is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760152"/>
                  <criterion comment="libguestfs-gfs2 is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760171"/>
                  <criterion comment="libguestfs-gobject is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175018"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760172"/>
                  <criterion comment="libguestfs-gobject is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760191"/>
                  <criterion comment="libguestfs-gobject-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175020"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-gobject-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760192"/>
                  <criterion comment="libguestfs-gobject-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750202"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760211"/>
                  <criterion comment="libguestfs-inspect-icons is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175022"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-inspect-icons is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760212"/>
                  <criterion comment="libguestfs-inspect-icons is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750222"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760231"/>
                  <criterion comment="libguestfs-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175024"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760232"/>
                  <criterion comment="libguestfs-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750242"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760251"/>
                  <criterion comment="libguestfs-java-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175026"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-java-devel is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760252"/>
                  <criterion comment="libguestfs-java-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750262"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760271"/>
                  <criterion comment="libguestfs-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175028"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-javadoc is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760272"/>
                  <criterion comment="libguestfs-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750282"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760291"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175030"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-ja is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760292"/>
                  <criterion comment="libguestfs-man-pages-ja is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750302"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760311"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175032"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-man-pages-uk is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760312"/>
                  <criterion comment="libguestfs-man-pages-uk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750322"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760331"/>
                  <criterion comment="libguestfs-rescue is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175034"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rescue is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760332"/>
                  <criterion comment="libguestfs-rescue is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750342"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760351"/>
                  <criterion comment="libguestfs-rsync is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175036"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-rsync is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760352"/>
                  <criterion comment="libguestfs-rsync is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750362"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760371"/>
                  <criterion comment="libguestfs-tools is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175038"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760372"/>
                  <criterion comment="libguestfs-tools is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750382"/>
                  <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760391"/>
                  <criterion comment="libguestfs-tools-c is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175040"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-tools-c is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760392"/>
                  <criterion comment="libguestfs-tools-c is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760411"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-winsupport is earlier than 0:8.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760412"/>
                  <criterion comment="libguestfs-winsupport is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175042"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046760431"/>
                  <criterion comment="libguestfs-xfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175044"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libguestfs-xfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046760432"/>
                  <criterion comment="libguestfs-xfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911750442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450451"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450452"/>
                  <criterion comment="libiscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175046"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450471"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-devel is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450472"/>
                  <criterion comment="libiscsi-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175048"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933450491"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libiscsi-utils is earlier than 0:1.18.0-8.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933450492"/>
                  <criterion comment="libiscsi-utils is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175050"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760511"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760512"/>
                  <criterion comment="libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676052"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046760531"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libnbd-devel is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046760532"/>
                  <criterion comment="libnbd-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760551"/>
                  <criterion comment="libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175054"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-admin is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760571"/>
                  <criterion comment="libvirt-admin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175056"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-bash-completion is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760591"/>
                  <criterion comment="libvirt-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175058"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-client is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760611"/>
                  <criterion comment="libvirt-client is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175060"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760631"/>
                  <criterion comment="libvirt-daemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175062"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760651"/>
                  <criterion comment="libvirt-daemon-config-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175064"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-config-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760671"/>
                  <criterion comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175066"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-interface is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760691"/>
                  <criterion comment="libvirt-daemon-driver-interface is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175068"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-network is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760711"/>
                  <criterion comment="libvirt-daemon-driver-network is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175070"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nodedev is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760731"/>
                  <criterion comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175072"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-nwfilter is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760751"/>
                  <criterion comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175074"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-qemu is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760771"/>
                  <criterion comment="libvirt-daemon-driver-qemu is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175076"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-secret is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760791"/>
                  <criterion comment="libvirt-daemon-driver-secret is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175078"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760811"/>
                  <criterion comment="libvirt-daemon-driver-storage is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175080"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-core is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760831"/>
                  <criterion comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175082"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-disk is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760851"/>
                  <criterion comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175084"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-gluster is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760871"/>
                  <criterion comment="libvirt-daemon-driver-storage-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175086"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760891"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175088"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760911"/>
                  <criterion comment="libvirt-daemon-driver-storage-iscsi-direct is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-logical is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760931"/>
                  <criterion comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175090"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-mpath is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760951"/>
                  <criterion comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175092"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-rbd is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760971"/>
                  <criterion comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175094"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-driver-storage-scsi is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046760991"/>
                  <criterion comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175096"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-daemon-kvm is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761011"/>
                  <criterion comment="libvirt-daemon-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175098"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761031"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-dbus is earlier than 0:1.3.0-2.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761032"/>
                  <criterion comment="libvirt-dbus is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175100"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-devel is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761051"/>
                  <criterion comment="libvirt-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175102"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-docs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761071"/>
                  <criterion comment="libvirt-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175104"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-libs is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761091"/>
                  <criterion comment="libvirt-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175106"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-lock-sanlock is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761111"/>
                  <criterion comment="libvirt-lock-sanlock is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175108"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="libvirt-nss is earlier than 0:6.0.0-28.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761131"/>
                  <criterion comment="libvirt-nss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175110"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761151"/>
                  <criterion comment="lua-guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175112"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="lua-guestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761152"/>
                  <criterion comment="lua-guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761171"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdfuse is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761172"/>
                  <criterion comment="nbdfuse is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761191"/>
                  <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761192"/>
                  <criterion comment="nbdkit is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175114"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761211"/>
                  <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
                  <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-bash-completion is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761212"/>
                  <criterion comment="nbdkit-bash-completion is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175116"/>
                  <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-filters is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761231"/>
                  <criterion comment="nbdkit-basic-filters is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676124"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-filters is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761232"/>
                  <criterion comment="nbdkit-basic-filters is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676124"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761251"/>
                  <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-basic-plugins is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761252"/>
                  <criterion comment="nbdkit-basic-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175118"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-curl-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761271"/>
                  <criterion comment="nbdkit-curl-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676128"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-curl-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761272"/>
                  <criterion comment="nbdkit-curl-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676128"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761291"/>
                  <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-devel is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761292"/>
                  <criterion comment="nbdkit-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175120"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761311"/>
                  <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-example-plugins is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761312"/>
                  <criterion comment="nbdkit-example-plugins is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175122"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-gzip-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761331"/>
                  <criterion comment="nbdkit-gzip-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-gzip-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761332"/>
                  <criterion comment="nbdkit-gzip-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-linuxdisk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761351"/>
                  <criterion comment="nbdkit-linuxdisk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-linuxdisk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761352"/>
                  <criterion comment="nbdkit-linuxdisk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-python-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761371"/>
                  <criterion comment="nbdkit-python-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-python-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761372"/>
                  <criterion comment="nbdkit-python-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-server is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761391"/>
                  <criterion comment="nbdkit-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-server is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761392"/>
                  <criterion comment="nbdkit-server is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-ssh-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761411"/>
                  <criterion comment="nbdkit-ssh-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-ssh-plugin is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761412"/>
                  <criterion comment="nbdkit-ssh-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-vddk-plugin is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761431"/>
                  <criterion comment="nbdkit-vddk-plugin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-xz-filter is earlier than 0:1.16.2-4.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761451"/>
                  <criterion comment="nbdkit-xz-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="nbdkit-xz-filter is earlier than 0:1.16.2-4.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761452"/>
                  <criterion comment="nbdkit-xz-filter is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451311"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451312"/>
                  <criterion comment="netcf is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175134"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451331"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-devel is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451332"/>
                  <criterion comment="netcf-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175136"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451351"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="netcf-libs is earlier than 0:0.2.8-12.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:201933451352"/>
                  <criterion comment="netcf-libs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175138"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761531"/>
                  <criterion comment="perl-Sys-Guestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175140"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Guestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761532"/>
                  <criterion comment="perl-Sys-Guestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751402"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761551"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-Sys-Virt is earlier than 0:6.0.0-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761552"/>
                  <criterion comment="perl-Sys-Virt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175142"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761571"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761572"/>
                  <criterion comment="perl-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175144"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="perl-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761573"/>
                  <criterion comment="perl-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751442"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761591"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761592"/>
                  <criterion comment="python3-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175146"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761593"/>
                  <criterion comment="python3-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751462"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761611"/>
                  <criterion comment="python3-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175148"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761612"/>
                  <criterion comment="python3-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751482"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761631"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libnbd is earlier than 0:1.2.2-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761632"/>
                  <criterion comment="python3-libnbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20204676164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761651"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="python3-libvirt is earlier than 0:6.0.0-1.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046761652"/>
                  <criterion comment="python3-libvirt is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175150"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112291"/>
                  <criterion comment="qemu-guest-agent is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175152"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-guest-agent is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112292"/>
                  <criterion comment="qemu-guest-agent is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751522"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112311"/>
                  <criterion comment="qemu-img is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175154"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-img is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112312"/>
                  <criterion comment="qemu-img is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751542"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112331"/>
                  <criterion comment="qemu-kvm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175156"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112332"/>
                  <criterion comment="qemu-kvm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751562"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112351"/>
                  <criterion comment="qemu-kvm-block-curl is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175158"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-curl is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112352"/>
                  <criterion comment="qemu-kvm-block-curl is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751582"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-gluster is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112371"/>
                  <criterion comment="qemu-kvm-block-gluster is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175160"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112391"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175162"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-iscsi is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112392"/>
                  <criterion comment="qemu-kvm-block-iscsi is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751622"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112411"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175164"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-rbd is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112412"/>
                  <criterion comment="qemu-kvm-block-rbd is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751642"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112431"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175166"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-block-ssh is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112432"/>
                  <criterion comment="qemu-kvm-block-ssh is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751662"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112451"/>
                  <criterion comment="qemu-kvm-common is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175168"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-common is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112452"/>
                  <criterion comment="qemu-kvm-common is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751682"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:4.2.0-34.module_el8.3.0+2082+0c705bc6.5" test_ref="oval:org.almalinux.alsa:tst:202107112471"/>
                  <criterion comment="qemu-kvm-core is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175170"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="qemu-kvm-core is earlier than 15:4.2.0-34.module_el8.3.0+755+88436ea4.5" test_ref="oval:org.almalinux.alsa:tst:202107112472"/>
                  <criterion comment="qemu-kvm-core is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751702"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.3.0+2048+e7a0a3ea" test_ref="oval:org.almalinux.alsa:tst:202046761871"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.4.0+2405+630e803b" test_ref="oval:org.almalinux.alsa:tst:202046761872"/>
                  <criterion comment="ruby-hivex is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175172"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-hivex is earlier than 0:1.3.18-20.module_el8.4.0+547+a85d02ba" test_ref="oval:org.almalinux.alsa:tst:202046761873"/>
                  <criterion comment="ruby-hivex is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751722"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046761891"/>
                  <criterion comment="ruby-libguestfs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175174"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="ruby-libguestfs is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046761892"/>
                  <criterion comment="ruby-libguestfs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751742"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761911"/>
                  <criterion comment="seabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175176"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seabios-bin is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761931"/>
                  <criterion comment="seabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175178"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="seavgabios-bin is earlier than 0:1.13.0-2.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046761951"/>
                  <criterion comment="seavgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175180"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451791"/>
                  <criterion comment="sgabios is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175182"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="sgabios-bin is earlier than 1:0.20170427git-3.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:201933451811"/>
                  <criterion comment="sgabios-bin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175184"/>
                  <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-10.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046762011"/>
                  <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin is earlier than 0:5.1.19-10.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046762012"/>
                  <criterion comment="supermin is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175186"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-10.module_el8.5.0+2608+72063365" test_ref="oval:org.almalinux.alsa:tst:202046762031"/>
                  <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="supermin-devel is earlier than 0:5.1.19-10.module_el8.5.0+243+0350d008" test_ref="oval:org.almalinux.alsa:tst:202046762032"/>
                  <criterion comment="supermin-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175188"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762051"/>
                  <criterion comment="virt-dib is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175190"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-dib is earlier than 1:1.40.2-25.module_el8.3.0+555+a55c8938" test_ref="oval:org.almalinux.alsa:tst:202046762052"/>
                  <criterion comment="virt-dib is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:201911751902"/>
                </criteria>
                <criteria operator="AND">
                  <criterion comment="virt-v2v is earlier than 1:1.40.2-25.module_el8.3.0+2048+e7a0a3ea.alma" test_ref="oval:org.almalinux.alsa:tst:202046762071"/>
                  <criterion comment="virt-v2v is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20191175194"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210734" version="635">
      <metadata>
        <title>ALSA-2021:0734: nodejs:12 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0734" ref_url="https://errata.almalinux.org/8/ALSA-2021-0734.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0734" ref_url="https://access.redhat.com/errata/RHSA-2021:0734" source="RHSA"/>
        <reference ref_id="CVE-2021-22883" ref_url="https://access.redhat.com/security/cve/CVE-2021-22883" source="CVE"/>
        <reference ref_id="CVE-2021-22884" ref_url="https://access.redhat.com/security/cve/CVE-2021-22884" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (12.21.0).

Security Fix(es):

* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)

* nodejs: DNS rebinding in --inspect (CVE-2021-22884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-04"/>
          <updated date="2021-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2021-22883" impact="important" public="20210220">CVE-2021-22883</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-22884" impact="moderate" public="20210218">CVE-2021-22884</cve>
          <bugzilla href="https://bugzilla.redhat.com/1932014" id="1932014">CVE-2021-22883 nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932024" id="1932024">CVE-2021-22884 nodejs: DNS rebinding in --inspect</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:12 is enabled" test_ref="oval:org.almalinux.alea:tst:20200330013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:12.21.0-1.module_el8.3.0+2048+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340011"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:12.21.0-1.module_el8.4.0+2225+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340012"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:12.21.0-1.module_el8.3.0+718+96bc7fec" test_ref="oval:org.almalinux.alsa:tst:202107340013"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:12.21.0-1.module_el8.3.0+2048+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340031"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:12.21.0-1.module_el8.4.0+2225+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340032"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:12.21.0-1.module_el8.3.0+718+96bc7fec" test_ref="oval:org.almalinux.alsa:tst:202107340033"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:12.21.0-1.module_el8.3.0+2048+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340051"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:12.21.0-1.module_el8.4.0+2225+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340052"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:12.21.0-1.module_el8.3.0+718+96bc7fec" test_ref="oval:org.almalinux.alsa:tst:202107340053"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:12.21.0-1.module_el8.3.0+2048+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340071"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:12.21.0-1.module_el8.4.0+2225+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340072"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:12.21.0-1.module_el8.3.0+718+96bc7fec" test_ref="oval:org.almalinux.alsa:tst:202107340073"/>
              <criterion comment="nodejs-full-i18n is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202028480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alsa:tst:202105490091"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alsa:tst:202105490092"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2521+c668cc9f" test_ref="oval:org.almalinux.alea:tst:202003300091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+85+79a7b441" test_ref="oval:org.almalinux.alea:tst:202003300092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.12.21.0.1.module_el8.3.0+2048+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340131"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.12.21.0.1.module_el8.4.0+2225+34fb5a07" test_ref="oval:org.almalinux.alsa:tst:202107340132"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.12.21.0.1.module_el8.3.0+718+96bc7fec" test_ref="oval:org.almalinux.alsa:tst:202107340133"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210735" version="635">
      <metadata>
        <title>ALSA-2021:0735: nodejs:10 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0735" ref_url="https://errata.almalinux.org/8/ALSA-2021-0735.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0735" ref_url="https://access.redhat.com/errata/RHSA-2021:0735" source="RHSA"/>
        <reference ref_id="CVE-2021-22883" ref_url="https://access.redhat.com/security/cve/CVE-2021-22883" source="CVE"/>
        <reference ref_id="CVE-2021-22884" ref_url="https://access.redhat.com/security/cve/CVE-2021-22884" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (10.24.0).

Security Fix(es):

* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)

* nodejs: DNS rebinding in --inspect (CVE-2021-22884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-04"/>
          <updated date="2021-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2021-22883" impact="important" public="20210220">CVE-2021-22883</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-22884" impact="moderate" public="20210218">CVE-2021-22884</cve>
          <bugzilla href="https://bugzilla.redhat.com/1932014" id="1932014">CVE-2021-22883 nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932024" id="1932024">CVE-2021-22884 nodejs: DNS rebinding in --inspect</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:10 is enabled" test_ref="oval:org.almalinux.alsa:tst:20192925013"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.24.0-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350011"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.24.0-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350012"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:10.24.0-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:202107350013"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.24.0-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350031"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.24.0-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350032"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:10.24.0-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:202107350033"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.24.0-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350051"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.24.0-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350052"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:10.24.0-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:202107350053"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:10.24.0-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350071"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:10.24.0-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350072"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:10.24.0-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:202107350073"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250071"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250072"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:1.18.3-1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250073"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250091"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:201929250092"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:17-3.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:201929250093"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.10.24.0.1.module_el8.3.0+2047+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350131"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.10.24.0.1.module_el8.4.0+2224+b07ac28e" test_ref="oval:org.almalinux.alsa:tst:202107350132"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.10.24.0.1.module_el8.5.0+81+7dbe79d3" test_ref="oval:org.almalinux.alsa:tst:202107350133"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210736" version="636">
      <metadata>
        <title>ALSA-2021:0736: java-1.8.0-ibm security update (Critical)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0736" ref_url="https://errata.almalinux.org/8/ALSA-2021-0736.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0736" ref_url="https://access.redhat.com/errata/RHSA-2021:0736" source="RHSA"/>
        <reference ref_id="CVE-2020-14781" ref_url="https://access.redhat.com/security/cve/CVE-2020-14781" source="CVE"/>
        <reference ref_id="CVE-2020-14782" ref_url="https://access.redhat.com/security/cve/CVE-2020-14782" source="CVE"/>
        <reference ref_id="CVE-2020-14803" ref_url="https://access.redhat.com/security/cve/CVE-2020-14803" source="CVE"/>
        <reference ref_id="CVE-2020-27221" ref_url="https://access.redhat.com/security/cve/CVE-2020-27221" source="CVE"/>
        <reference ref_id="CVE-2020-2773" ref_url="https://access.redhat.com/security/cve/CVE-2020-2773" source="CVE"/>
        <description>IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP25.

Security Fix(es):

* IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding (CVE-2020-27221)

* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773)

* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)

* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)

* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-04"/>
          <updated date="2021-03-04"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-319" href="https://access.redhat.com/security/cve/CVE-2020-14781" impact="moderate" public="20201020">CVE-2020-14781</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-295" href="https://access.redhat.com/security/cve/CVE-2020-14782" impact="moderate" public="20201020">CVE-2020-14782</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-367" href="https://access.redhat.com/security/cve/CVE-2020-14803" impact="moderate" public="20201020">CVE-2020-14803</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2020-27221" impact="critical" public="20210212">CVE-2020-27221</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-248" href="https://access.redhat.com/security/cve/CVE-2020-2773" impact="moderate" public="20200414">CVE-2020-2773</cve>
          <bugzilla href="https://bugzilla.redhat.com/1823224" id="1823224">CVE-2020-2773 OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889274" id="1889274">CVE-2020-14781 OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889290" id="1889290">CVE-2020-14782 OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1889895" id="1889895">CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1928555" id="1928555">CVE-2020-27221 IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding</bugzilla>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736001"/>
              <criterion comment="java-1.8.0-ibm is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-demo is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736003"/>
              <criterion comment="java-1.8.0-ibm-demo is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-devel is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736005"/>
              <criterion comment="java-1.8.0-ibm-devel is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-headless is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736007"/>
              <criterion comment="java-1.8.0-ibm-headless is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-jdbc is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736009"/>
              <criterion comment="java-1.8.0-ibm-jdbc is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-plugin is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736011"/>
              <criterion comment="java-1.8.0-ibm-plugin is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-src is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736013"/>
              <criterion comment="java-1.8.0-ibm-src is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="java-1.8.0-ibm-webstart is earlier than 1:1.8.0.6.25-2.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210736015"/>
              <criterion comment="java-1.8.0-ibm-webstart is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191238016"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210744" version="636">
      <metadata>
        <title>ALSA-2021:0744: nodejs:14 security and bug fix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0744" ref_url="https://errata.almalinux.org/8/ALSA-2021-0744.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0744" ref_url="https://access.redhat.com/errata/RHSA-2021:0744" source="RHSA"/>
        <reference ref_id="CVE-2021-22883" ref_url="https://access.redhat.com/security/cve/CVE-2021-22883" source="CVE"/>
        <reference ref_id="CVE-2021-22884" ref_url="https://access.redhat.com/security/cve/CVE-2021-22884" source="CVE"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (14.16.0).

Security Fix(es):

* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)

* nodejs: DNS rebinding in --inspect (CVE-2021-22884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Node.js should not be built with "--debug-nghttp2" (BZ#1932427)</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-08"/>
          <updated date="2021-03-08"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://access.redhat.com/security/cve/CVE-2021-22883" impact="important" public="20210220">CVE-2021-22883</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://access.redhat.com/security/cve/CVE-2021-22884" impact="moderate" public="20210218">CVE-2021-22884</cve>
          <bugzilla href="https://bugzilla.redhat.com/1932014" id="1932014">CVE-2021-22883 nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion</bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1932024" id="1932024">CVE-2021-22884 nodejs: DNS rebinding in --inspect</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module nodejs:14 is enabled" test_ref="oval:org.almalinux.alsa:tst:20210551015"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:14.16.0-2.module_el8.3.0+2049+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440011"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:14.16.0-2.module_el8.4.0+2226+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440012"/>
              <criterion comment="nodejs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs is earlier than 1:14.16.0-2.module_el8.3.0+719+59eb7cbb" test_ref="oval:org.almalinux.alsa:tst:202107440013"/>
              <criterion comment="nodejs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300022"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:14.16.0-2.module_el8.3.0+2049+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440031"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:14.16.0-2.module_el8.4.0+2226+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440032"/>
              <criterion comment="nodejs-devel is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-devel is earlier than 1:14.16.0-2.module_el8.3.0+719+59eb7cbb" test_ref="oval:org.almalinux.alsa:tst:202107440033"/>
              <criterion comment="nodejs-devel is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300042"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:14.16.0-2.module_el8.3.0+2049+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440051"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:14.16.0-2.module_el8.4.0+2226+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440052"/>
              <criterion comment="nodejs-docs is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330006"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-docs is earlier than 1:14.16.0-2.module_el8.3.0+719+59eb7cbb" test_ref="oval:org.almalinux.alsa:tst:202107440053"/>
              <criterion comment="nodejs-docs is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300062"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:14.16.0-2.module_el8.3.0+2049+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440071"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:14.16.0-2.module_el8.4.0+2226+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440072"/>
              <criterion comment="nodejs-full-i18n is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alsa:tst:20202848008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-full-i18n is earlier than 1:14.16.0-2.module_el8.3.0+719+59eb7cbb" test_ref="oval:org.almalinux.alsa:tst:202107440073"/>
              <criterion comment="nodejs-full-i18n is signed with CentOS 8 key" test_ref="oval:org.almalinux.alsa:tst:202028480082"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+2522+3bd42762" test_ref="oval:org.almalinux.alsa:tst:202105510091"/>
              <criterion comment="nodejs-nodemon is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330008"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-nodemon is earlier than 0:2.0.3-1.module_el8.4.0+663+8c237b4b" test_ref="oval:org.almalinux.alsa:tst:202105510092"/>
              <criterion comment="nodejs-nodemon is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300082"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:23-3.module_el8.5.0+2618+8d46dafd" test_ref="oval:org.almalinux.alsa:tst:202105510111"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is aarch64|x86_64" test_ref="oval:org.almalinux.alsa:tst:2021415400511"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="nodejs-packaging is earlier than 0:23-3.module_el8.5.0+254+b4526b16" test_ref="oval:org.almalinux.alsa:tst:202105510112"/>
              <criterion comment="nodejs-packaging is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330010"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.14.16.0.2.module_el8.3.0+2049+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440131"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.14.16.0.2.module_el8.4.0+2226+b92e1eb6" test_ref="oval:org.almalinux.alsa:tst:202107440132"/>
              <criterion comment="npm is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alea:tst:20200330012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="npm is earlier than 1:6.14.11-1.14.16.0.2.module_el8.3.0+719+59eb7cbb" test_ref="oval:org.almalinux.alsa:tst:202107440133"/>
              <criterion comment="npm is signed with CentOS 8 key" test_ref="oval:org.almalinux.alea:tst:202003300122"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210788" version="636">
      <metadata>
        <title>ALSA-2021:0788: dotnet security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0788" ref_url="https://errata.almalinux.org/8/ALSA-2021-0788.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0788" ref_url="https://access.redhat.com/errata/RHSA-2021:0788" source="RHSA"/>
        <reference ref_id="CVE-2021-26701" ref_url="https://access.redhat.com/security/cve/CVE-2021-26701" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 2.1.522 and .NET Core Runtime 2.1.26.

Security Fix(es):

* dotnet: System.Text.Encodings.Web Remote Code Execution (CVE-2021-26701)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-09"/>
          <updated date="2021-03-09"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2021-26701" impact="important" public="20210225">CVE-2021-26701</cve>
          <bugzilla href="https://bugzilla.redhat.com/1933740" id="1933740">CVE-2021-26701 dotnet: System.Text.Encodings.Web Remote Code Execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="dotnet-host-fxr-2.1 is earlier than 0:2.1.26-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210788001"/>
              <criterion comment="dotnet-host-fxr-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259006"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-2.1 is earlier than 0:2.1.26-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210788003"/>
              <criterion comment="dotnet-runtime-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1 is earlier than 0:2.1.522-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210788005"/>
              <criterion comment="dotnet-sdk-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259010"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-2.1.5xx is earlier than 0:2.1.522-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210788007"/>
              <criterion comment="dotnet-sdk-2.1.5xx is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259012"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210790" version="635">
      <metadata>
        <title>ALSA-2021:0790: dotnet3.1 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0790" ref_url="https://errata.almalinux.org/8/ALSA-2021-0790.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0790" ref_url="https://access.redhat.com/errata/RHSA-2021:0790" source="RHSA"/>
        <reference ref_id="CVE-2021-26701" ref_url="https://access.redhat.com/security/cve/CVE-2021-26701" source="CVE"/>
        <description>.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.113 and .NET Core Runtime 3.1.13.

Security Fix(es):

* dotnet: System.Text.Encodings.Web Remote Code Execution (CVE-2021-26701)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-09"/>
          <updated date="2021-03-09"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2021-26701" impact="important" public="20210225">CVE-2021-26701</cve>
          <bugzilla href="https://bugzilla.redhat.com/1933740" id="1933740">CVE-2021-26701 dotnet: System.Text.Encodings.Web Remote Code Execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790001"/>
              <criterion comment="aspnetcore-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790003"/>
              <criterion comment="aspnetcore-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790005"/>
              <criterion comment="dotnet-apphost-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790007"/>
              <criterion comment="dotnet-hostfxr-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790009"/>
              <criterion comment="dotnet-runtime-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-3.1 is earlier than 0:3.1.113-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790011"/>
              <criterion comment="dotnet-sdk-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-3.1 is earlier than 0:3.1.13-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790013"/>
              <criterion comment="dotnet-targeting-pack-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-3.1 is earlier than 0:3.1.113-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210790015"/>
              <criterion comment="dotnet-templates-3.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20202250020"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210793" version="635">
      <metadata>
        <title>ALSA-2021:0793: .NET Core on AlmaLinux 8 security and bugfix update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0793" ref_url="https://errata.almalinux.org/8/ALSA-2021-0793.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0793" ref_url="https://access.redhat.com/errata/RHSA-2021:0793" source="RHSA"/>
        <reference ref_id="CVE-2021-26701" ref_url="https://access.redhat.com/security/cve/CVE-2021-26701" source="CVE"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 5.0.104 and .NET Runtime 5.0.4.

Security Fix(es):

* dotnet: System.Text.Encodings.Web Remote Code Execution (CVE-2021-26701)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-09"/>
          <updated date="2021-03-09"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://access.redhat.com/security/cve/CVE-2021-26701" impact="important" public="20210225">CVE-2021-26701</cve>
          <bugzilla href="https://bugzilla.redhat.com/1933740" id="1933740">CVE-2021-26701 dotnet: System.Text.Encodings.Web Remote Code Execution</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="aspnetcore-runtime-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793001"/>
              <criterion comment="aspnetcore-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="aspnetcore-targeting-pack-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793003"/>
              <criterion comment="aspnetcore-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet is earlier than 0:5.0.104-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793005"/>
              <criterion comment="dotnet is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259002"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-apphost-pack-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793007"/>
              <criterion comment="dotnet-apphost-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094008"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-host is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793009"/>
              <criterion comment="dotnet-host is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20191259004"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-hostfxr-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793011"/>
              <criterion comment="dotnet-hostfxr-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094012"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-runtime-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793013"/>
              <criterion comment="dotnet-runtime-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094014"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-sdk-5.0 is earlier than 0:5.0.104-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793015"/>
              <criterion comment="dotnet-sdk-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094016"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-targeting-pack-5.0 is earlier than 0:5.0.4-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793017"/>
              <criterion comment="dotnet-targeting-pack-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094018"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="dotnet-templates-5.0 is earlier than 0:5.0.104-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793019"/>
              <criterion comment="dotnet-templates-5.0 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210094020"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="netstandard-targeting-pack-2.1 is earlier than 0:5.0.104-1.el8_3" test_ref="oval:org.almalinux.alsa:tst:20210793021"/>
              <criterion comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20200130022"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210809" version="636">
      <metadata>
        <title>ALSA-2021:0809: wpa_supplicant security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0809" ref_url="https://errata.almalinux.org/8/ALSA-2021-0809.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0809" ref_url="https://access.redhat.com/errata/RHSA-2021:0809" source="RHSA"/>
        <reference ref_id="CVE-2021-27803" ref_url="https://access.redhat.com/security/cve/CVE-2021-27803" source="CVE"/>
        <description>The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.

Security Fix(es):

* wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-11"/>
          <updated date="2021-03-11"/>
          <cve cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://access.redhat.com/security/cve/CVE-2021-27803" impact="important" public="20210225">CVE-2021-27803</cve>
          <bugzilla href="https://bugzilla.redhat.com/1933361" id="1933361">CVE-2021-27803 wpa_supplicant: Use-after-free in P2P provision discovery processing</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:8::baseos</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="wpa_supplicant is earlier than 1:2.9-2.el8_3.1" test_ref="oval:org.almalinux.alsa:tst:20210809001"/>
          <criterion comment="wpa_supplicant is signed with AlmaLinux OS 8 key" test_ref="oval:org.almalinux.alsa:tst:20210809002"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:org.almalinux.alsa:def:20210966" version="635">
      <metadata>
        <title>ALSA-2021:0966: pki-core:10.6 security update (Important)</title>
        <affected family="unix">
          <platform>AlmaLinux 8</platform>
        </affected>
        <reference ref_id="ALSA-2021:0966" ref_url="https://errata.almalinux.org/8/ALSA-2021-0966.html" source="ALSA"/>
        <reference ref_id="RHSA-2021:0966" ref_url="https://access.redhat.com/errata/RHSA-2021:0966" source="RHSA"/>
        <reference ref_id="CVE-2021-20179" ref_url="https://access.redhat.com/security/cve/CVE-2021-20179" source="CVE"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.

Security Fix(es):

* pki-core: Unprivileged users can renew any certificate (CVE-2021-20179)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="security@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2021 Red Hat, Inc.
Copyright 2022 AlmaLinux OS Foundation</rights>
          <issued date="2021-03-23"/>
          <updated date="2021-03-23"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-863" href="https://access.redhat.com/security/cve/CVE-2021-20179" impact="important" public="20210312">CVE-2021-20179</cve>
          <bugzilla href="https://bugzilla.redhat.com/1914379" id="1914379">CVE-2021-20179 pki-core: Unprivileged users can renew any certificate</bugzilla>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:8::appstream</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="AlmaLinux must be installed" test_ref="oval:org.almalinux.alba:tst:20191992005"/>
        <criteria operator="AND">
          <criterion comment="Module pki-core:10.6 is enabled" test_ref="oval:org.almalinux.alba:tst:20193416094"/>
          <criterion comment="AlmaLinux 8 is installed" test_ref="oval:org.almalinux.alba:tst:20191992003"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion comment="jss is earlier than 0:4.7.3-1.module_el8.3.0+2061+d5cd4219.alma" test_ref="oval:org.almalinux.alsa:tst:202048470701"/>
              <criterion comment="jss is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416069"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jss is earlier than 0:4.7.3-1.module_el8.3.0+500+458aeb54" test_ref="oval:org.almalinux.alsa:tst:202048470702"/>
              <criterion comment="jss is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160692"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jss-javadoc is earlier than 0:4.7.3-1.module_el8.3.0+2061+d5cd4219.alma" test_ref="oval:org.almalinux.alsa:tst:202048470721"/>
              <criterion comment="jss-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416071"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="jss-javadoc is earlier than 0:4.7.3-1.module_el8.3.0+500+458aeb54" test_ref="oval:org.almalinux.alsa:tst:202048470722"/>
              <criterion comment="jss-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160712"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.3.0+2061+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:202048470741"/>
              <criterion comment="ldapjdk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416073"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.4.0+2497+635979e4" test_ref="oval:org.almalinux.alsa:tst:202048470742"/>
              <criterion comment="ldapjdk is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416073"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk is earlier than 0:4.22.0-1.module_el8.4.0+627+e8937f0b" test_ref="oval:org.almalinux.alsa:tst:202048470743"/>
              <criterion comment="ldapjdk is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160732"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.3.0+2061+d5cd4219" test_ref="oval:org.almalinux.alsa:tst:202048470761"/>
              <criterion comment="ldapjdk-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416075"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.4.0+2497+635979e4" test_ref="oval:org.almalinux.alsa:tst:202048470762"/>
              <criterion comment="ldapjdk-javadoc is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416075"/>
              <criterion comment="AlmaLinux arch is aarch64" test_ref="oval:org.almalinux.alsa:tst:2021237502521"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="ldapjdk-javadoc is earlier than 0:4.22.0-1.module_el8.4.0+627+e8937f0b" test_ref="oval:org.almalinux.alsa:tst:202048470763"/>
              <criterion comment="ldapjdk-javadoc is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160752"/>
              <criterion comment="AlmaLinux arch is ppc64le" test_ref="oval:org.almalinux.alsa:tst:2021237502531"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-base is earlier than 0:10.9.4-3.module_el8.3.0+2066+73f6df5b" test_ref="oval:org.almalinux.alsa:tst:202109660091"/>
              <criterion comment="pki-base is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416077"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-base is earlier than 0:10.9.4-3.module_el8.3.0+729+097af0d5" test_ref="oval:org.almalinux.alsa:tst:202109660092"/>
              <criterion comment="pki-base is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160772"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-base-java is earlier than 0:10.9.4-3.module_el8.3.0+2066+73f6df5b" test_ref="oval:org.almalinux.alsa:tst:202109660111"/>
              <criterion comment="pki-base-java is signed with AlmaLinux 8 key" test_ref="oval:org.almalinux.alba:tst:20193416079"/>
              <criterion comment="AlmaLinux arch is x86_64" test_ref="oval:org.almalinux.alsa:tst:2020549300911"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-base-java is earlier than 0:10.9.4-3.module_el8.3.0+729+097af0d5" test_ref="oval:org.almalinux.alsa:tst:202109660112"/>
              <criterion comment="pki-base-java is signed with CentOS 8 key" test_ref="oval:org.almalinux.alba:tst:201934160792"/>
              <criterion comment="AlmaLinux arch is aarch64|ppc64le" test_ref="oval:org.almalinux.alsa:tst:2020549300921"/>
            </criteria>
            <criteria operator="AND">
              <criterion comment="pki-ca is earl